CVE-2025-59099: CWE-35: Path Traversal in dormakaba Access Manager 92xx-k5
The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication. Hence, it is possible to retrieve all files stored on the file system, including the SQLite database Database.sq3, containing badge information and the corresponding PIN codes. Additionally, when trying to access certain files, the web server crashes and becomes unreachable for about 60 seconds. This can be abused to continuously send the request and cause denial of service.
AI Analysis
Technical Summary
The dormakaba Access Manager 92xx-k5 product incorporates an open-source web server called CompactWebServer, written in C#. This web server suffers from a path traversal vulnerability (CWE-35) identified as CVE-2025-59099, which allows attackers to manipulate file path parameters in HTTP GET requests to access arbitrary files on the underlying file system without any authentication. The vulnerability affects versions prior to XAMB 04.05.21. Exploiting this flaw, an attacker can retrieve sensitive files including the SQLite database file Database.sq3, which contains badge information and associated PIN codes used for physical access control. This breach compromises confidentiality by exposing credentials and access data. Additionally, attempts to access certain files cause the web server to crash and become unreachable for approximately 60 seconds, enabling an attacker to mount a denial-of-service attack by repeatedly triggering these requests. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network, increasing its risk profile. Although no public exploits are currently known in the wild, the high CVSS 8.8 score reflects the critical nature of the vulnerability due to its ease of exploitation and impact on confidentiality and availability. The lack of authentication bypasses any access control mechanisms, making all deployments of affected versions vulnerable. This vulnerability is particularly concerning for organizations relying on dormakaba Access Manager for physical security management, as it exposes sensitive access credentials and can disrupt access control services.
Potential Impact
For European organizations, the impact of CVE-2025-59099 is significant. The exposure of badge information and PIN codes undermines physical security controls, potentially allowing unauthorized access to sensitive facilities, data centers, or restricted areas. This can lead to theft, espionage, or sabotage. The ability to cause denial of service by crashing the web server disrupts access management operations, potentially locking out legitimate users and causing operational downtime. Organizations in critical infrastructure sectors such as energy, transportation, finance, and government are especially at risk, as they often rely on dormakaba systems for secure access control. The breach of confidentiality and availability can also have regulatory implications under GDPR, as personal data related to employees or contractors may be exposed. The vulnerability’s remote exploitation capability increases the attack surface, requiring urgent attention to prevent exploitation by cybercriminals or state-sponsored actors targeting European entities.
Mitigation Recommendations
To mitigate CVE-2025-59099, affected organizations should immediately upgrade dormakaba Access Manager 92xx-k5 to version XAMB 04.05.21 or later, where the vulnerability is addressed. In the absence of a patch, network segmentation should be enforced to isolate the Access Manager web server from untrusted networks, limiting exposure to potential attackers. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block path traversal patterns in HTTP requests targeting the CompactWebServer. Regularly audit and monitor access logs for suspicious GET requests attempting directory traversal sequences (e.g., ../). Implement strict access controls on the file system hosting the web server to minimize the impact of unauthorized file access. Additionally, consider disabling or restricting access to the embedded web server if not required for daily operations. Conduct thorough security assessments and penetration tests post-mitigation to verify the effectiveness of applied controls. Finally, ensure incident response plans include procedures for handling potential data breaches involving physical access credentials.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Italy, Belgium, Spain, Sweden, Austria
CVE-2025-59099: CWE-35: Path Traversal in dormakaba Access Manager 92xx-k5
Description
The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication. Hence, it is possible to retrieve all files stored on the file system, including the SQLite database Database.sq3, containing badge information and the corresponding PIN codes. Additionally, when trying to access certain files, the web server crashes and becomes unreachable for about 60 seconds. This can be abused to continuously send the request and cause denial of service.
AI-Powered Analysis
Technical Analysis
The dormakaba Access Manager 92xx-k5 product incorporates an open-source web server called CompactWebServer, written in C#. This web server suffers from a path traversal vulnerability (CWE-35) identified as CVE-2025-59099, which allows attackers to manipulate file path parameters in HTTP GET requests to access arbitrary files on the underlying file system without any authentication. The vulnerability affects versions prior to XAMB 04.05.21. Exploiting this flaw, an attacker can retrieve sensitive files including the SQLite database file Database.sq3, which contains badge information and associated PIN codes used for physical access control. This breach compromises confidentiality by exposing credentials and access data. Additionally, attempts to access certain files cause the web server to crash and become unreachable for approximately 60 seconds, enabling an attacker to mount a denial-of-service attack by repeatedly triggering these requests. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network, increasing its risk profile. Although no public exploits are currently known in the wild, the high CVSS 8.8 score reflects the critical nature of the vulnerability due to its ease of exploitation and impact on confidentiality and availability. The lack of authentication bypasses any access control mechanisms, making all deployments of affected versions vulnerable. This vulnerability is particularly concerning for organizations relying on dormakaba Access Manager for physical security management, as it exposes sensitive access credentials and can disrupt access control services.
Potential Impact
For European organizations, the impact of CVE-2025-59099 is significant. The exposure of badge information and PIN codes undermines physical security controls, potentially allowing unauthorized access to sensitive facilities, data centers, or restricted areas. This can lead to theft, espionage, or sabotage. The ability to cause denial of service by crashing the web server disrupts access management operations, potentially locking out legitimate users and causing operational downtime. Organizations in critical infrastructure sectors such as energy, transportation, finance, and government are especially at risk, as they often rely on dormakaba systems for secure access control. The breach of confidentiality and availability can also have regulatory implications under GDPR, as personal data related to employees or contractors may be exposed. The vulnerability’s remote exploitation capability increases the attack surface, requiring urgent attention to prevent exploitation by cybercriminals or state-sponsored actors targeting European entities.
Mitigation Recommendations
To mitigate CVE-2025-59099, affected organizations should immediately upgrade dormakaba Access Manager 92xx-k5 to version XAMB 04.05.21 or later, where the vulnerability is addressed. In the absence of a patch, network segmentation should be enforced to isolate the Access Manager web server from untrusted networks, limiting exposure to potential attackers. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block path traversal patterns in HTTP requests targeting the CompactWebServer. Regularly audit and monitor access logs for suspicious GET requests attempting directory traversal sequences (e.g., ../). Implement strict access controls on the file system hosting the web server to minimize the impact of unauthorized file access. Additionally, consider disabling or restricting access to the embedded web server if not required for daily operations. Conduct thorough security assessments and penetration tests post-mitigation to verify the effectiveness of applied controls. Finally, ensure incident response plans include procedures for handling potential data breaches involving physical access credentials.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-09-09T07:52:56.383Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6977400a4623b1157c815ea0
Added to database: 1/26/2026, 10:20:58 AM
Last enriched: 1/26/2026, 10:36:59 AM
Last updated: 2/7/2026, 6:29:00 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
UnknownCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.