CVE-2025-40592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Siemens Mendix Studio Pro 10

Medium
VulnerabilityCVE-2025-40592cvecve-2025-40592cwe-22
Published: Thu Jun 12 2025 (06/12/2025, 08:05:09 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Mendix Studio Pro 10

Description

A vulnerability has been identified in Mendix Studio Pro 10 (All versions < V10.23.0), Mendix Studio Pro 10.12 (All versions < V10.12.17), Mendix Studio Pro 10.18 (All versions < V10.18.7), Mendix Studio Pro 10.6 (All versions < V10.6.24), Mendix Studio Pro 11 (All versions), Mendix Studio Pro 8 (All versions < V8.18.35), Mendix Studio Pro 9 (All versions < V9.24.35). A zip path traversal vulnerability exists in the module installation process of Studio Pro. By crafting a malicious module and distributing it via (for example) the Mendix Marketplace, an attacker could write or modify arbitrary files in directories outside a developer’s project directory upon module installation.

AI-Powered Analysis

AILast updated: 06/12/2025, 08:38:30 UTC

Technical Analysis

CVE-2025-40592 is a path traversal vulnerability identified in Siemens Mendix Studio Pro 10 and several other versions of Mendix Studio Pro (including versions 8, 9, 10, and 11). The vulnerability arises during the module installation process, where the software improperly limits pathname inputs when extracting zip archives. Specifically, a maliciously crafted module distributed, for example, via the Mendix Marketplace, can exploit this flaw to write or modify arbitrary files outside the intended project directory. This occurs because the path traversal allows directory traversal sequences (e.g., "../") within the zip archive to escape the restricted directory sandbox. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS 3.1 base score is 6.1, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N) shows that the attack can be performed remotely over the network without privileges but requires user interaction (installing the malicious module). The impact is high on integrity, as arbitrary files can be overwritten or created, potentially leading to code execution or tampering with project files, but there is no direct impact on confidentiality or availability. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable software boundary. No known exploits are currently in the wild, and no patches are linked yet, indicating that mitigation relies on cautious module installation and monitoring. This vulnerability affects all Mendix Studio Pro versions prior to the specified fixed versions (e.g., <10.23.0 for version 10).

Potential Impact

For European organizations using Mendix Studio Pro for application development, this vulnerability poses a significant risk to the integrity of their development environments. An attacker distributing a malicious module could compromise project files or inject malicious code, potentially leading to compromised applications that are deployed to production. This could result in downstream security breaches, data integrity issues, and reputational damage. Since Mendix is widely used for rapid application development, especially in sectors like finance, manufacturing, and public services, the risk extends to critical business applications. The requirement for user interaction (module installation) means that social engineering or supply chain attacks targeting developers are likely attack vectors. The vulnerability does not directly impact confidentiality or availability but could indirectly lead to broader security incidents if exploited to insert backdoors or disrupt development workflows. The medium CVSS score reflects the moderate ease of exploitation combined with significant integrity impact. European organizations relying on Mendix Studio Pro should consider this vulnerability a priority to address to avoid potential compromise of their software supply chain and development integrity.

Mitigation Recommendations

Restrict module installation to trusted sources only, such as verified modules from the official Mendix Marketplace with strong vetting processes. Implement strict code review and validation procedures for any third-party or internally developed Mendix modules before installation. Use sandboxing or isolated environments for module installation to prevent unauthorized file system modifications outside the project directory. Monitor file system changes in development environments for unexpected modifications outside project directories, using file integrity monitoring tools. Educate developers about the risks of installing untrusted modules and enforce policies requiring verification of module provenance. Apply updates and patches from Siemens Mendix Studio Pro as soon as they become available, prioritizing versions 10.23.0, 10.12.17, 10.18.7, 10.6.24, 8.18.35, and 9.24.35 or later. Consider network-level controls to restrict access to module distribution points and use endpoint protection to detect suspicious activity during module installation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:20:17.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684a8e82358c65714e6a3a5a

Added to database: 6/12/2025, 8:23:30 AM

Last enriched: 6/12/2025, 8:38:30 AM

Last updated: 6/13/2025, 7:04:32 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats