Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70995: n/a

0
Unknown
VulnerabilityCVE-2025-70995cvecve-2025-70995
Published: Thu Mar 05 2026 (03/05/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments.

AI-Powered Analysis

AILast updated: 03/05/2026, 21:30:33 UTC

Technical Analysis

CVE-2025-70995 is a remote code execution vulnerability found in Aranda Service Desk Web Edition (ASDK API 8.6). The flaw stems from insufficient validation of uploaded files in the API endpoint /ASDKAPI/api/v8.6/item/addfile, which accepts file uploads from authenticated users. An attacker with valid credentials can upload a malicious web.config file, a configuration file used by ASP.NET applications to control runtime behavior. This crafted web.config file modifies the execution context of the directory where files are uploaded, enabling the ASP.NET runtime to compile and execute attacker-supplied code, such as an .aspx webshell. This effectively grants the attacker remote command execution capabilities on the server hosting the application. The vulnerability affects both On-Premise and SaaS deployments, broadening the attack surface. Since the attack requires authentication but no further user interaction, it can be exploited by any user with valid credentials, including those with limited privileges if they can upload files. No CVSS score has been assigned yet, and no public exploits are currently known. The vulnerability highlights a critical failure in input validation and access control mechanisms within the file upload functionality of the Aranda Service Desk Web Edition.

Potential Impact

The impact of CVE-2025-70995 is severe for organizations using Aranda Service Desk Web Edition. Successful exploitation allows attackers to execute arbitrary code remotely on the affected servers, potentially leading to full system compromise. This can result in unauthorized data access, data modification, disruption of service, and lateral movement within the network. Since the vulnerability affects both On-Premise and SaaS deployments, organizations relying on this service for IT service management face risks of operational disruption and data breaches. Attackers could deploy persistent webshells to maintain long-term access, exfiltrate sensitive information, or launch further attacks against internal systems. The requirement for authentication limits exploitation to insiders or compromised accounts, but this does not reduce the threat significantly given the ease of exploitation once authenticated. The absence of a patch or mitigation guidance increases the urgency for organizations to implement compensating controls. Overall, the vulnerability poses a critical risk to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

To mitigate CVE-2025-70995, organizations should immediately restrict file upload permissions to only trusted and necessary users, minimizing the number of accounts that can upload files. Implement strict validation and sanitization of uploaded files, ensuring that configuration files like web.config cannot be uploaded or executed. Employ application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious POST requests targeting the /ASDKAPI/api/v8.6/item/addfile endpoint. Monitor logs for unusual file upload activity and the creation of unexpected .config or .aspx files in upload directories. Segregate the upload directory with restrictive permissions and disable execution rights if possible. Enforce strong authentication and session management to reduce the risk of compromised credentials. If feasible, isolate the Aranda Service Desk environment from critical internal networks to limit lateral movement. Engage with the vendor for patches or updates and apply them promptly once available. Conduct regular security assessments and penetration testing focused on file upload functionalities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9f294c48b3f10ff5116cb

Added to database: 3/5/2026, 9:16:04 PM

Last enriched: 3/5/2026, 9:30:33 PM

Last updated: 3/5/2026, 10:20:07 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses