CVE-2025-41073: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TESI Gandia Integra Total
Path Traversal vulnerability in version 4.4.2236.1 of TESI Gandia Integra Total. This issue allows an authenticated attacker to download a ZIP file containing files from the server, including those located in parent directories (e.g., ..\..\..), by exploiting the “direstudio” parameter in “/encuestas/integraweb[_v4]/integra/html/view/comprimir.php”.
AI Analysis
Technical Summary
CVE-2025-41073 is a path traversal vulnerability classified under CWE-22 affecting TESI Gandia Integra Total version 4.4.2236.1. The vulnerability arises from improper validation of the 'direstudio' parameter in the '/encuestas/integraweb[_v4]/integra/html/view/comprimir.php' endpoint. An authenticated attacker can manipulate this parameter to include directory traversal sequences (e.g., '..\..\..') to access files outside the intended directory scope. This allows the attacker to download a ZIP archive containing arbitrary files from the server's filesystem, potentially exposing sensitive data stored in parent directories. The vulnerability requires authentication but no additional user interaction or elevated privileges, and the attack vector is network accessible (AV:N). The CVSS 4.0 base score is 7.1, indicating high severity, with low attack complexity and no user interaction required. The vulnerability compromises confidentiality (VC:H) but does not affect integrity or availability. No known exploits have been reported in the wild yet. The vulnerability was reserved in April 2025 and published in October 2025, with no patch currently available, highlighting the need for immediate mitigation steps. The affected product is used in enterprise environments, often handling sensitive survey and data collection operations, increasing the risk of data leakage.
Potential Impact
For European organizations, the impact of CVE-2025-41073 can be significant due to the potential exposure of sensitive internal files and data. Since the vulnerability allows authenticated attackers to download arbitrary files, confidential business information, personal data protected under GDPR, or intellectual property could be compromised. This breach of confidentiality could lead to regulatory penalties, reputational damage, and operational disruptions. Organizations in sectors such as government, healthcare, finance, and critical infrastructure that use TESI Gandia Integra Total for data collection or processing are particularly at risk. The ease of exploitation and network accessibility mean that insider threats or compromised credentials could quickly lead to data exfiltration. Additionally, the lack of a current patch increases the window of exposure. The vulnerability does not directly affect system integrity or availability but can serve as a foothold for further attacks or lateral movement within networks.
Mitigation Recommendations
1. Immediately restrict access to the vulnerable endpoint '/encuestas/integraweb[_v4]/integra/html/view/comprimir.php' by implementing strict access controls and network segmentation to limit exposure only to trusted users. 2. Enforce strong authentication mechanisms and monitor authentication logs for suspicious activity, such as unusual file download requests or repeated access attempts to the 'direstudio' parameter. 3. Implement web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns in HTTP requests targeting the vulnerable parameter. 4. Conduct thorough audits of server file permissions to ensure sensitive files outside the application directory are not accessible or readable by the web server process. 5. Regularly back up critical data and monitor for signs of data exfiltration. 6. Engage with TESI for updates and apply official patches or security updates as soon as they become available. 7. Consider deploying intrusion detection systems (IDS) tuned to detect exploitation attempts targeting this vulnerability. 8. Educate users about the importance of credential security to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
Spain, Germany, France, Italy, United Kingdom, Netherlands
CVE-2025-41073: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TESI Gandia Integra Total
Description
Path Traversal vulnerability in version 4.4.2236.1 of TESI Gandia Integra Total. This issue allows an authenticated attacker to download a ZIP file containing files from the server, including those located in parent directories (e.g., ..\..\..), by exploiting the “direstudio” parameter in “/encuestas/integraweb[_v4]/integra/html/view/comprimir.php”.
AI-Powered Analysis
Technical Analysis
CVE-2025-41073 is a path traversal vulnerability classified under CWE-22 affecting TESI Gandia Integra Total version 4.4.2236.1. The vulnerability arises from improper validation of the 'direstudio' parameter in the '/encuestas/integraweb[_v4]/integra/html/view/comprimir.php' endpoint. An authenticated attacker can manipulate this parameter to include directory traversal sequences (e.g., '..\..\..') to access files outside the intended directory scope. This allows the attacker to download a ZIP archive containing arbitrary files from the server's filesystem, potentially exposing sensitive data stored in parent directories. The vulnerability requires authentication but no additional user interaction or elevated privileges, and the attack vector is network accessible (AV:N). The CVSS 4.0 base score is 7.1, indicating high severity, with low attack complexity and no user interaction required. The vulnerability compromises confidentiality (VC:H) but does not affect integrity or availability. No known exploits have been reported in the wild yet. The vulnerability was reserved in April 2025 and published in October 2025, with no patch currently available, highlighting the need for immediate mitigation steps. The affected product is used in enterprise environments, often handling sensitive survey and data collection operations, increasing the risk of data leakage.
Potential Impact
For European organizations, the impact of CVE-2025-41073 can be significant due to the potential exposure of sensitive internal files and data. Since the vulnerability allows authenticated attackers to download arbitrary files, confidential business information, personal data protected under GDPR, or intellectual property could be compromised. This breach of confidentiality could lead to regulatory penalties, reputational damage, and operational disruptions. Organizations in sectors such as government, healthcare, finance, and critical infrastructure that use TESI Gandia Integra Total for data collection or processing are particularly at risk. The ease of exploitation and network accessibility mean that insider threats or compromised credentials could quickly lead to data exfiltration. Additionally, the lack of a current patch increases the window of exposure. The vulnerability does not directly affect system integrity or availability but can serve as a foothold for further attacks or lateral movement within networks.
Mitigation Recommendations
1. Immediately restrict access to the vulnerable endpoint '/encuestas/integraweb[_v4]/integra/html/view/comprimir.php' by implementing strict access controls and network segmentation to limit exposure only to trusted users. 2. Enforce strong authentication mechanisms and monitor authentication logs for suspicious activity, such as unusual file download requests or repeated access attempts to the 'direstudio' parameter. 3. Implement web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns in HTTP requests targeting the vulnerable parameter. 4. Conduct thorough audits of server file permissions to ensure sensitive files outside the application directory are not accessible or readable by the web server process. 5. Regularly back up critical data and monitor for signs of data exfiltration. 6. Engage with TESI for updates and apply official patches or security updates as soon as they become available. 7. Consider deploying intrusion detection systems (IDS) tuned to detect exploitation attempts targeting this vulnerability. 8. Educate users about the importance of credential security to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:34.458Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68fa0d4a551b7103c4840ac5
Added to database: 10/23/2025, 11:11:06 AM
Last enriched: 10/23/2025, 11:17:12 AM
Last updated: 10/23/2025, 6:30:19 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54808: CWE-522 Insufficiently Protected Credentials in Oxford Nano Technologies MinKNOW
HighCVE-2025-23347: CWE-276 Incorrect Default Permissions in NVIDIA GeForce
HighCVE-2025-23345: CWE-125 Out-of-bounds Read in NVIDIA GeForce
MediumCVE-2025-23332: CWE-476 NULL Pointer Dereference in NVIDIA Virtual GPU Manager
MediumCVE-2025-23330: CWE-476 NULL Pointer Dereference in NVIDIA GeForce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.