CVE-2025-5714: Path Traversal in SoluçõesCoop iSoluçõesWEB
A vulnerability was found in SoluçõesCoop iSoluçõesWEB up to 20250516. It has been classified as problematic. This affects an unknown part of the file /sys/up.upload.php of the component Profile Information Update. The manipulation of the argument nomeArquivo leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-5714 is a path traversal vulnerability identified in the SoluçõesCoop iSoluçõesWEB product, specifically affecting versions up to 20250516. The vulnerability resides in the /sys/up.upload.php file within the Profile Information Update component. The flaw arises from improper validation or sanitization of the 'nomeArquivo' parameter, which an attacker can manipulate to traverse directories on the server's filesystem. This allows an attacker to access files outside the intended directory scope remotely without requiring authentication or user interaction. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which suggests limited privileges but no authentication), and no user interaction needed (UI:N). The impact is limited primarily to confidentiality (VC:L) with no impact on integrity or availability. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability could allow unauthorized reading of sensitive files on the server, potentially exposing configuration files, credentials, or other sensitive data, depending on the server's file structure and permissions. Since the vulnerability is in a web application component used for profile information updates, it is likely part of a system managing user data or cooperative services, which may contain sensitive personal or organizational information. The lack of a patch link suggests that an official fix may not yet be publicly available, but upgrading the affected component to a newer, secure version is recommended once released.
Potential Impact
For European organizations using SoluçõesCoop iSoluçõesWEB, this vulnerability poses a moderate risk to the confidentiality of sensitive data stored on affected servers. Unauthorized file access could lead to exposure of personal data, internal configuration files, or other proprietary information, potentially violating GDPR and other data protection regulations. The ability to exploit this remotely without authentication increases the threat level, especially for organizations with externally accessible instances of iSoluçõesWEB. While the vulnerability does not directly impact system integrity or availability, the exposure of sensitive data could facilitate further attacks or lead to reputational damage. Organizations in sectors such as finance, healthcare, or cooperative services that rely on this software may face increased risk due to the nature of the data handled. Additionally, the public disclosure of exploit details may lead to opportunistic attacks targeting unpatched systems across Europe.
Mitigation Recommendations
European organizations should immediately assess their deployment of SoluçõesCoop iSoluçõesWEB to determine if they are running affected versions (up to 20250516). Until an official patch is released, organizations should implement strict input validation and sanitization on the 'nomeArquivo' parameter at the web application firewall (WAF) or reverse proxy level to block path traversal patterns such as '../' sequences. Restricting file system permissions for the web server user to limit access to sensitive directories can reduce the impact of successful exploitation. Monitoring web server logs for suspicious requests targeting /sys/up.upload.php or unusual file access patterns is recommended to detect potential exploitation attempts. Network segmentation and limiting external exposure of the affected web application can reduce the attack surface. Once a vendor patch or update is available, organizations should prioritize timely deployment. Additionally, conducting a thorough audit of exposed files and credentials after patching is advisable to identify any data leakage.
Affected Countries
Portugal, Spain, France, Germany, Italy
CVE-2025-5714: Path Traversal in SoluçõesCoop iSoluçõesWEB
Description
A vulnerability was found in SoluçõesCoop iSoluçõesWEB up to 20250516. It has been classified as problematic. This affects an unknown part of the file /sys/up.upload.php of the component Profile Information Update. The manipulation of the argument nomeArquivo leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-5714 is a path traversal vulnerability identified in the SoluçõesCoop iSoluçõesWEB product, specifically affecting versions up to 20250516. The vulnerability resides in the /sys/up.upload.php file within the Profile Information Update component. The flaw arises from improper validation or sanitization of the 'nomeArquivo' parameter, which an attacker can manipulate to traverse directories on the server's filesystem. This allows an attacker to access files outside the intended directory scope remotely without requiring authentication or user interaction. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which suggests limited privileges but no authentication), and no user interaction needed (UI:N). The impact is limited primarily to confidentiality (VC:L) with no impact on integrity or availability. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability could allow unauthorized reading of sensitive files on the server, potentially exposing configuration files, credentials, or other sensitive data, depending on the server's file structure and permissions. Since the vulnerability is in a web application component used for profile information updates, it is likely part of a system managing user data or cooperative services, which may contain sensitive personal or organizational information. The lack of a patch link suggests that an official fix may not yet be publicly available, but upgrading the affected component to a newer, secure version is recommended once released.
Potential Impact
For European organizations using SoluçõesCoop iSoluçõesWEB, this vulnerability poses a moderate risk to the confidentiality of sensitive data stored on affected servers. Unauthorized file access could lead to exposure of personal data, internal configuration files, or other proprietary information, potentially violating GDPR and other data protection regulations. The ability to exploit this remotely without authentication increases the threat level, especially for organizations with externally accessible instances of iSoluçõesWEB. While the vulnerability does not directly impact system integrity or availability, the exposure of sensitive data could facilitate further attacks or lead to reputational damage. Organizations in sectors such as finance, healthcare, or cooperative services that rely on this software may face increased risk due to the nature of the data handled. Additionally, the public disclosure of exploit details may lead to opportunistic attacks targeting unpatched systems across Europe.
Mitigation Recommendations
European organizations should immediately assess their deployment of SoluçõesCoop iSoluçõesWEB to determine if they are running affected versions (up to 20250516). Until an official patch is released, organizations should implement strict input validation and sanitization on the 'nomeArquivo' parameter at the web application firewall (WAF) or reverse proxy level to block path traversal patterns such as '../' sequences. Restricting file system permissions for the web server user to limit access to sensitive directories can reduce the impact of successful exploitation. Monitoring web server logs for suspicious requests targeting /sys/up.upload.php or unusual file access patterns is recommended to detect potential exploitation attempts. Network segmentation and limiting external exposure of the affected web application can reduce the attack surface. Once a vendor patch or update is available, organizations should prioritize timely deployment. Additionally, conducting a thorough audit of exposed files and credentials after patching is advisable to identify any data leakage.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-05T04:53:12.542Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6842df031a426642debc9630
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 7:12:23 PM
Last updated: 8/6/2025, 12:28:50 AM
Views: 12
Related Threats
CVE-2025-8310: CWE-862 Missing Authorization in Ivanti Virtual Application Delivery ControllerCWE-862
MediumCVE-2025-8297: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Avalanche
HighCVE-2025-8296: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ivanti Avalanche
HighCVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.