CVE-2025-20059
Published: 20 February 2025
Summary
CVE-2025-20059 is a critical-severity Relative Path Traversal (CWE-23) vulnerability in Forgerock (inferred from references). Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 22.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely patching and remediation of the specific relative path traversal vulnerability in affected PingAM Java Policy Agent versions as detailed in the ForgeRock advisory.
Directly prevents exploitation of the path traversal and parameter injection by validating all user-supplied inputs including paths and parameters.
Limits damage from successful path traversal by enforcing least privilege on the policy agent process, restricting access to sensitive files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated path traversal + parameter injection on public-facing agent directly enables T1190 exploitation and T1005 local file data access.
NVD Description
Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9.
Deeper analysisAI
CVE-2025-20059 is a Relative Path Traversal vulnerability (CWE-23) in the Ping Identity PingAM Java Policy Agent that enables Parameter Injection. The issue affects PingAM Java Policy Agent versions through 5.10.3, through 2023.11.1, and through 2024.9. Published on 2025-02-20, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), indicating critical severity due to its potential for high confidentiality and availability impacts.
Unauthenticated remote attackers with network access can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation allows reading sensitive files via path traversal and injecting parameters, leading to unauthorized access to confidential data (high confidentiality impact) and potential denial of service (high availability impact), while scope remains unchanged and integrity is unaffected.
The ForgeRock advisory at https://backstage.forgerock.com/knowledge/advisories/article/a61848355 provides details on mitigation strategies and available patches for affected versions.
Details
- CWE(s)