Skip to main content

CVE-2025-5714: Path Traversal in SoluçõesCoop iSoluçõesWEB

Medium
VulnerabilityCVE-2025-5714cvecve-2025-5714
Published: Fri Jun 06 2025 (06/06/2025, 03:00:17 UTC)
Source: CVE Database V5
Vendor/Project: SoluçõesCoop
Product: iSoluçõesWEB

Description

A vulnerability was found in SoluçõesCoop iSoluçõesWEB up to 20250516. It has been classified as problematic. This affects an unknown part of the file /sys/up.upload.php of the component Profile Information Update. The manipulation of the argument nomeArquivo leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 07/07/2025, 19:12:23 UTC

Technical Analysis

CVE-2025-5714 is a path traversal vulnerability identified in the SoluçõesCoop iSoluçõesWEB product, specifically affecting versions up to 20250516. The vulnerability resides in the /sys/up.upload.php file within the Profile Information Update component. The flaw arises from improper validation or sanitization of the 'nomeArquivo' parameter, which an attacker can manipulate to traverse directories on the server's filesystem. This allows an attacker to access files outside the intended directory scope remotely without requiring authentication or user interaction. The vulnerability is classified as problematic and has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which suggests limited privileges but no authentication), and no user interaction needed (UI:N). The impact is limited primarily to confidentiality (VC:L) with no impact on integrity or availability. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability could allow unauthorized reading of sensitive files on the server, potentially exposing configuration files, credentials, or other sensitive data, depending on the server's file structure and permissions. Since the vulnerability is in a web application component used for profile information updates, it is likely part of a system managing user data or cooperative services, which may contain sensitive personal or organizational information. The lack of a patch link suggests that an official fix may not yet be publicly available, but upgrading the affected component to a newer, secure version is recommended once released.

Potential Impact

For European organizations using SoluçõesCoop iSoluçõesWEB, this vulnerability poses a moderate risk to the confidentiality of sensitive data stored on affected servers. Unauthorized file access could lead to exposure of personal data, internal configuration files, or other proprietary information, potentially violating GDPR and other data protection regulations. The ability to exploit this remotely without authentication increases the threat level, especially for organizations with externally accessible instances of iSoluçõesWEB. While the vulnerability does not directly impact system integrity or availability, the exposure of sensitive data could facilitate further attacks or lead to reputational damage. Organizations in sectors such as finance, healthcare, or cooperative services that rely on this software may face increased risk due to the nature of the data handled. Additionally, the public disclosure of exploit details may lead to opportunistic attacks targeting unpatched systems across Europe.

Mitigation Recommendations

European organizations should immediately assess their deployment of SoluçõesCoop iSoluçõesWEB to determine if they are running affected versions (up to 20250516). Until an official patch is released, organizations should implement strict input validation and sanitization on the 'nomeArquivo' parameter at the web application firewall (WAF) or reverse proxy level to block path traversal patterns such as '../' sequences. Restricting file system permissions for the web server user to limit access to sensitive directories can reduce the impact of successful exploitation. Monitoring web server logs for suspicious requests targeting /sys/up.upload.php or unusual file access patterns is recommended to detect potential exploitation attempts. Network segmentation and limiting external exposure of the affected web application can reduce the attack surface. Once a vendor patch or update is available, organizations should prioritize timely deployment. Additionally, conducting a thorough audit of exposed files and credentials after patching is advisable to identify any data leakage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-05T04:53:12.542Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6842df031a426642debc9630

Added to database: 6/6/2025, 12:28:51 PM

Last enriched: 7/7/2025, 7:12:23 PM

Last updated: 8/6/2025, 12:28:50 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats