CVE-2025-23410
Published: 05 March 2025
Summary
CVE-2025-23410 is a critical-severity Relative Path Traversal (CWE-23) vulnerability in Cisa (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of uploaded archive files to block path traversal sequences during unzipping and inspection in GMOD Apollo.
Mandates timely remediation of the specific path traversal flaw in GMOD Apollo through patches or updates.
Restricts characteristics of uploaded archives to exclude path traversal elements inconsistent with expected organism or sequence data.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The path traversal vulnerability in the public-facing web upload/unzip feature allows unauthenticated remote attackers to write arbitrary files on the server, directly enabling exploitation of public-facing applications (T1190) and facilitating deployment of web shells (T1100) for code execution and persistence.
NVD Description
When uploading organism or sequence data via the web interface, GMOD Apollo will unzip and inspect the files and will not check for path traversal in supported archive types.
Deeper analysisAI
CVE-2025-23410 is a path traversal vulnerability (CWE-23) affecting GMOD Apollo. The issue arises when uploading organism or sequence data via the web interface, as the application unzips and inspects files from supported archive types without checking for path traversal attacks. Published on 2025-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.
An unauthenticated remote attacker with network access can exploit this vulnerability by submitting a malicious archive file through the web upload feature. Exploitation requires low complexity and no user interaction, enabling high-impact compromise of confidentiality, integrity, and availability, such as arbitrary file access or modification on the server.
Mitigation guidance is available in the CISA ICS advisory ICSA-25-063-07 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-07.
Details
- CWE(s)