CVE-2025-35056: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Newforma Project Center
Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' 'StreamStampImage' accepts an encrypted file path and returns an image of the specified file. An authenticated attacker can read arbitrary files subject to the privileges of NIX, typically 'NT AUTHORITY\NetworkService', and the ability of StreamStampImage to process the file. The encrypted file path can be generated using the shared, hard-coded secret key described in CVE-2025-35052. This vulnerability cannot be exploited as an 'anonymous' user as described in CVE-2025-35062.
AI Analysis
Technical Summary
CVE-2025-35056 is a path traversal vulnerability (CWE-22) affecting Newforma Project Center's Info Exchange (NIX) component, specifically the '/UserWeb/Common/MarkupServices.ashx' endpoint's 'StreamStampImage' function. This function accepts an encrypted file path parameter and returns an image of the specified file. Due to improper validation of the pathname, an authenticated attacker can manipulate the encrypted file path to access arbitrary files on the server. The encryption relies on a shared, hard-coded secret key, previously documented in CVE-2025-35052, allowing attackers who know this key to generate valid encrypted paths. The vulnerability is constrained by the privileges of the NIX service, typically running as 'NT AUTHORITY\NetworkService', limiting the scope of accessible files to those readable by this account. Exploitation does not require user interaction but does require authentication, and anonymous users cannot exploit this issue as clarified in CVE-2025-35062. The vulnerability impacts confidentiality by potentially exposing sensitive files but does not affect integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The CVSS v3.1 score is 5.0 (medium), reflecting the moderate risk posed by this vulnerability given the authentication requirement and limited privilege context.
Potential Impact
For European organizations using Newforma Project Center, this vulnerability poses a risk of unauthorized disclosure of sensitive project files, internal documents, or configuration data accessible to the NetworkService account. Such data leakage could lead to exposure of intellectual property, client information, or internal operational details, potentially violating GDPR requirements concerning data confidentiality and protection. The impact is particularly significant for architecture, engineering, and construction firms that rely on Newforma for project collaboration and document management. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could damage reputation and lead to regulatory penalties. The requirement for authentication reduces the risk from external attackers but insider threats or compromised credentials could enable exploitation. Given the shared secret key is hard-coded, attackers with access to this key can automate attacks, increasing the threat level. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.
Mitigation Recommendations
European organizations should immediately audit their use of Newforma Project Center and restrict access to the Info Exchange component to trusted users only. Since no official patch is linked, organizations should monitor Newforma's advisories for updates or patches addressing CVE-2025-35056 and CVE-2025-35052. In the interim, consider implementing network-level controls such as IP whitelisting or VPN access to limit exposure. Review and rotate any shared secret keys if possible, and enforce strong authentication and credential management policies to reduce risk of credential compromise. Conduct regular file system permission audits to minimize the data accessible by the NetworkService account. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable endpoint. Additionally, monitor logs for unusual access patterns to the '/UserWeb/Common/MarkupServices.ashx' endpoint. Finally, educate users about the risks of credential sharing and enforce least privilege principles to limit the impact of potential exploitation.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-35056: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Newforma Project Center
Description
Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' 'StreamStampImage' accepts an encrypted file path and returns an image of the specified file. An authenticated attacker can read arbitrary files subject to the privileges of NIX, typically 'NT AUTHORITY\NetworkService', and the ability of StreamStampImage to process the file. The encrypted file path can be generated using the shared, hard-coded secret key described in CVE-2025-35052. This vulnerability cannot be exploited as an 'anonymous' user as described in CVE-2025-35062.
AI-Powered Analysis
Technical Analysis
CVE-2025-35056 is a path traversal vulnerability (CWE-22) affecting Newforma Project Center's Info Exchange (NIX) component, specifically the '/UserWeb/Common/MarkupServices.ashx' endpoint's 'StreamStampImage' function. This function accepts an encrypted file path parameter and returns an image of the specified file. Due to improper validation of the pathname, an authenticated attacker can manipulate the encrypted file path to access arbitrary files on the server. The encryption relies on a shared, hard-coded secret key, previously documented in CVE-2025-35052, allowing attackers who know this key to generate valid encrypted paths. The vulnerability is constrained by the privileges of the NIX service, typically running as 'NT AUTHORITY\NetworkService', limiting the scope of accessible files to those readable by this account. Exploitation does not require user interaction but does require authentication, and anonymous users cannot exploit this issue as clarified in CVE-2025-35062. The vulnerability impacts confidentiality by potentially exposing sensitive files but does not affect integrity or availability. No patches have been linked yet, and no known exploits are reported in the wild. The CVSS v3.1 score is 5.0 (medium), reflecting the moderate risk posed by this vulnerability given the authentication requirement and limited privilege context.
Potential Impact
For European organizations using Newforma Project Center, this vulnerability poses a risk of unauthorized disclosure of sensitive project files, internal documents, or configuration data accessible to the NetworkService account. Such data leakage could lead to exposure of intellectual property, client information, or internal operational details, potentially violating GDPR requirements concerning data confidentiality and protection. The impact is particularly significant for architecture, engineering, and construction firms that rely on Newforma for project collaboration and document management. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could damage reputation and lead to regulatory penalties. The requirement for authentication reduces the risk from external attackers but insider threats or compromised credentials could enable exploitation. Given the shared secret key is hard-coded, attackers with access to this key can automate attacks, increasing the threat level. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks.
Mitigation Recommendations
European organizations should immediately audit their use of Newforma Project Center and restrict access to the Info Exchange component to trusted users only. Since no official patch is linked, organizations should monitor Newforma's advisories for updates or patches addressing CVE-2025-35056 and CVE-2025-35052. In the interim, consider implementing network-level controls such as IP whitelisting or VPN access to limit exposure. Review and rotate any shared secret keys if possible, and enforce strong authentication and credential management policies to reduce risk of credential compromise. Conduct regular file system permission audits to minimize the data accessible by the NetworkService account. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable endpoint. Additionally, monitor logs for unusual access patterns to the '/UserWeb/Common/MarkupServices.ashx' endpoint. Finally, educate users about the risks of credential sharing and enforce least privilege principles to limit the impact of potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:56:24.406Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e81d26ba0e608b4fac9439
Added to database: 10/9/2025, 8:37:58 PM
Last enriched: 10/9/2025, 8:54:55 PM
Last updated: 10/11/2025, 9:23:04 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58297: CWE-121 Stack-based Buffer Overflow in Huawei HarmonyOS
MediumCVE-2025-58299: CWE-416 Use After Free in Huawei HarmonyOS
HighCVE-2025-58298: CWE-121 Stack-based Buffer Overflow in Huawei HarmonyOS
HighCVE-2025-11594: Improper Validation of Specified Quantity in Input in ywxbear PHP-Bookstore-Website-Example
MediumCVE-2025-58286: CWE-25 Path Traversal: '/../filedir' in Huawei HarmonyOS
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.