CVE-2025-35114 – Agiloft Default Credentials Privilege Escalation

The following table lists the changes that have been made to the
CVE-2025-35114 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 9119a7d8-5eab-497f-8521-727c672e3725

    Aug. 26, 2025

    Action Type Old Value New Value
    Added Description Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Added CWE CWE-1392
    Added Reference https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.json
    Added Reference https://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolution
    Added Reference https://www.cve.org/CVERecord?id=CVE-2025-35114
Share the Post:

Related Posts