CVE-2025-4377: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Sparx Systems Pro Cloud Server
Improper Limitation of a Pathname caused a Path Traversal vulnerability in Sparx Systems Pro Cloud Server. This vulnerability is present in logview.php and it allows reading arbitrary files on the filesystem. Logview is accessible on Pro Cloud Server Configuration interface. This issue affects Pro Cloud Server: earlier than 6.0.165.
AI Analysis
Technical Summary
CVE-2025-4377 is a high-severity vulnerability affecting Sparx Systems Pro Cloud Server versions earlier than 6.0.165. The root cause is an improper limitation of a pathname to a restricted directory, classified under CWE-22 (Path Traversal) and CWE-20 (Improper Input Validation). Specifically, the vulnerability exists in the logview.php component, which is part of the Pro Cloud Server Configuration interface. This flaw allows an attacker with authenticated access and high privileges (as indicated by the CVSS vector requiring PR:H) to manipulate the pathname input parameters to read arbitrary files on the underlying filesystem. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N). The impact on confidentiality is high since sensitive files can be exposed, while integrity and availability impacts are low to limited. The vulnerability scope is high, affecting the entire Pro Cloud Server installation, and the attack complexity is low, given the lack of additional conditions or user interaction. No known exploits are currently reported in the wild, but the presence of this vulnerability in a server product used for enterprise modeling and collaboration poses a significant risk if left unpatched.
Potential Impact
For European organizations using Sparx Systems Pro Cloud Server, this vulnerability could lead to unauthorized disclosure of sensitive configuration files, credentials, or other critical data stored on the server. Since Pro Cloud Server is often used in software development, systems engineering, and enterprise architecture environments, exposure of internal project data or infrastructure details could facilitate further targeted attacks, including lateral movement within networks. The requirement for high privilege authentication reduces the risk from external attackers without credentials but raises concerns about insider threats or compromised accounts. The breach of confidentiality could also lead to compliance violations under GDPR if personal or sensitive data is exposed. Additionally, the loss of trust and potential operational disruptions during incident response could have financial and reputational consequences for affected organizations.
Mitigation Recommendations
Organizations should immediately upgrade Sparx Systems Pro Cloud Server to version 6.0.165 or later, where this vulnerability is addressed. Until patching is possible, restrict access to the Pro Cloud Server Configuration interface to trusted administrators only, ideally through network segmentation and VPNs. Implement strict access controls and monitor authentication logs for suspicious activity indicating potential misuse of privileged accounts. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting logview.php. Conduct regular security audits and penetration tests focusing on input validation weaknesses. Additionally, enforce the principle of least privilege for all user accounts and consider multi-factor authentication (MFA) to reduce the risk of credential compromise. Finally, maintain up-to-date backups and incident response plans tailored to potential data exposure scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2025-4377: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Sparx Systems Pro Cloud Server
Description
Improper Limitation of a Pathname caused a Path Traversal vulnerability in Sparx Systems Pro Cloud Server. This vulnerability is present in logview.php and it allows reading arbitrary files on the filesystem. Logview is accessible on Pro Cloud Server Configuration interface. This issue affects Pro Cloud Server: earlier than 6.0.165.
AI-Powered Analysis
Technical Analysis
CVE-2025-4377 is a high-severity vulnerability affecting Sparx Systems Pro Cloud Server versions earlier than 6.0.165. The root cause is an improper limitation of a pathname to a restricted directory, classified under CWE-22 (Path Traversal) and CWE-20 (Improper Input Validation). Specifically, the vulnerability exists in the logview.php component, which is part of the Pro Cloud Server Configuration interface. This flaw allows an attacker with authenticated access and high privileges (as indicated by the CVSS vector requiring PR:H) to manipulate the pathname input parameters to read arbitrary files on the underlying filesystem. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N). The impact on confidentiality is high since sensitive files can be exposed, while integrity and availability impacts are low to limited. The vulnerability scope is high, affecting the entire Pro Cloud Server installation, and the attack complexity is low, given the lack of additional conditions or user interaction. No known exploits are currently reported in the wild, but the presence of this vulnerability in a server product used for enterprise modeling and collaboration poses a significant risk if left unpatched.
Potential Impact
For European organizations using Sparx Systems Pro Cloud Server, this vulnerability could lead to unauthorized disclosure of sensitive configuration files, credentials, or other critical data stored on the server. Since Pro Cloud Server is often used in software development, systems engineering, and enterprise architecture environments, exposure of internal project data or infrastructure details could facilitate further targeted attacks, including lateral movement within networks. The requirement for high privilege authentication reduces the risk from external attackers without credentials but raises concerns about insider threats or compromised accounts. The breach of confidentiality could also lead to compliance violations under GDPR if personal or sensitive data is exposed. Additionally, the loss of trust and potential operational disruptions during incident response could have financial and reputational consequences for affected organizations.
Mitigation Recommendations
Organizations should immediately upgrade Sparx Systems Pro Cloud Server to version 6.0.165 or later, where this vulnerability is addressed. Until patching is possible, restrict access to the Pro Cloud Server Configuration interface to trusted administrators only, ideally through network segmentation and VPNs. Implement strict access controls and monitor authentication logs for suspicious activity indicating potential misuse of privileged accounts. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting logview.php. Conduct regular security audits and penetration tests focusing on input validation weaknesses. Additionally, enforce the principle of least privilege for all user accounts and consider multi-factor authentication (MFA) to reduce the risk of credential compromise. Finally, maintain up-to-date backups and incident response plans tailored to potential data exposure scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NCSC-FI
- Date Reserved
- 2025-05-06T05:21:12.322Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9818c4522896dcbd7b10
Added to database: 5/21/2025, 9:08:40 AM
Last enriched: 7/5/2025, 2:56:12 AM
Last updated: 8/8/2025, 12:04:06 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.