CVE-2025-59744: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AndSoft e-TMS
Path traversal vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to access files only within the web root using the “docurl” parameter in “/lib/asp/DOCSAVEASASP.ASP”.
AI Analysis
Technical Summary
CVE-2025-59744 is a high-severity path traversal vulnerability identified in AndSoft's e-TMS version 25.03. The vulnerability arises from improper limitation of a pathname to a restricted directory (CWE-22) within the web application, specifically in the handling of the “docurl” parameter in the endpoint “/lib/asp/DOCSAVEASASP.ASP”. This flaw allows an unauthenticated remote attacker to manipulate the “docurl” parameter to access arbitrary files located within the web root directory of the server. Although the attacker cannot traverse outside the web root, this still exposes sensitive files that may contain configuration data, source code, or other information that could facilitate further attacks. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation, as it requires no authentication or user interaction and can be triggered remotely over the network. The vulnerability does not affect files outside the web root, which somewhat limits the scope, but the confidentiality impact is high due to potential exposure of sensitive information. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on 2025-09-19 and published on 2025-10-02 by INCIBE, indicating recent discovery and disclosure. The technical vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high confidentiality impact without affecting integrity or availability.
Potential Impact
For European organizations using AndSoft e-TMS v25.03, this vulnerability poses a significant risk to confidentiality. Attackers could access sensitive files within the web root, potentially exposing configuration files, credentials, or proprietary business information. This could lead to further compromise, such as privilege escalation or lateral movement within the network. Given that e-TMS is a transportation management system, exposure of operational data could disrupt logistics and supply chain processes, impacting business continuity and causing financial losses. The lack of authentication requirement increases the risk of automated scanning and exploitation attempts. Although the vulnerability does not allow access beyond the web root, the information disclosure alone can be leveraged for targeted attacks. European organizations in sectors relying heavily on logistics and transportation management, such as manufacturing, retail, and distribution, are particularly vulnerable. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exposure of personal or sensitive data through this vulnerability could lead to compliance violations and penalties.
Mitigation Recommendations
Organizations should immediately audit their use of AndSoft e-TMS v25.03 and restrict access to the vulnerable endpoint “/lib/asp/DOCSAVEASASP.ASP” via web application firewalls (WAF) or network access controls to trusted IPs only. Implement strict input validation and sanitization on the “docurl” parameter to prevent path traversal sequences such as '../'. Until a vendor patch is released, consider deploying virtual patching rules in WAFs to detect and block exploitation attempts. Conduct thorough file permission reviews to ensure sensitive files within the web root are not accessible or contain minimal sensitive information. Monitor web server logs for suspicious requests targeting the vulnerable parameter. Engage with AndSoft for timely patch updates and apply them promptly once available. Additionally, implement network segmentation to isolate the e-TMS system from critical infrastructure and sensitive data repositories to limit potential lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-59744: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in AndSoft e-TMS
Description
Path traversal vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to access files only within the web root using the “docurl” parameter in “/lib/asp/DOCSAVEASASP.ASP”.
AI-Powered Analysis
Technical Analysis
CVE-2025-59744 is a high-severity path traversal vulnerability identified in AndSoft's e-TMS version 25.03. The vulnerability arises from improper limitation of a pathname to a restricted directory (CWE-22) within the web application, specifically in the handling of the “docurl” parameter in the endpoint “/lib/asp/DOCSAVEASASP.ASP”. This flaw allows an unauthenticated remote attacker to manipulate the “docurl” parameter to access arbitrary files located within the web root directory of the server. Although the attacker cannot traverse outside the web root, this still exposes sensitive files that may contain configuration data, source code, or other information that could facilitate further attacks. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation, as it requires no authentication or user interaction and can be triggered remotely over the network. The vulnerability does not affect files outside the web root, which somewhat limits the scope, but the confidentiality impact is high due to potential exposure of sensitive information. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on 2025-09-19 and published on 2025-10-02 by INCIBE, indicating recent discovery and disclosure. The technical vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and high confidentiality impact without affecting integrity or availability.
Potential Impact
For European organizations using AndSoft e-TMS v25.03, this vulnerability poses a significant risk to confidentiality. Attackers could access sensitive files within the web root, potentially exposing configuration files, credentials, or proprietary business information. This could lead to further compromise, such as privilege escalation or lateral movement within the network. Given that e-TMS is a transportation management system, exposure of operational data could disrupt logistics and supply chain processes, impacting business continuity and causing financial losses. The lack of authentication requirement increases the risk of automated scanning and exploitation attempts. Although the vulnerability does not allow access beyond the web root, the information disclosure alone can be leveraged for targeted attacks. European organizations in sectors relying heavily on logistics and transportation management, such as manufacturing, retail, and distribution, are particularly vulnerable. Additionally, regulatory frameworks like GDPR impose strict data protection requirements, and exposure of personal or sensitive data through this vulnerability could lead to compliance violations and penalties.
Mitigation Recommendations
Organizations should immediately audit their use of AndSoft e-TMS v25.03 and restrict access to the vulnerable endpoint “/lib/asp/DOCSAVEASASP.ASP” via web application firewalls (WAF) or network access controls to trusted IPs only. Implement strict input validation and sanitization on the “docurl” parameter to prevent path traversal sequences such as '../'. Until a vendor patch is released, consider deploying virtual patching rules in WAFs to detect and block exploitation attempts. Conduct thorough file permission reviews to ensure sensitive files within the web root are not accessible or contain minimal sensitive information. Monitor web server logs for suspicious requests targeting the vulnerable parameter. Engage with AndSoft for timely patch updates and apply them promptly once available. Additionally, implement network segmentation to isolate the e-TMS system from critical infrastructure and sensitive data repositories to limit potential lateral movement in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-09-19T11:43:12.303Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68de8a13d034459bbdfb0c70
Added to database: 10/2/2025, 2:20:03 PM
Last enriched: 10/2/2025, 2:20:20 PM
Last updated: 11/13/2025, 1:00:10 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12377: CWE-862 Missing Authorization in smub Gallery Plugin for WordPress – Envira Photo Gallery
MediumCVE-2025-64384: Missing Authorization in jetmonsters JetFormBuilder
UnknownCVE-2025-64383: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Qode Qi Blocks
UnknownCVE-2025-64382: Missing Authorization in WebToffee Order Export & Order Import for WooCommerce
UnknownCVE-2025-64381: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevelop Booking Calendar
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.