CVE-2025-26137
Published: 18 March 2025
Summary
CVE-2025-26137 is a high-severity PHP Remote File Inclusion (CWE-98) vulnerability in Systemic-Rm Risk Value. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 33.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of the ReportUrl parameter to block crafted file paths enabling local file inclusion and arbitrary file reads.
Enforces restrictions on information inputs like ReportUrl at application boundaries to prevent path traversal to sensitive system files.
Mandates enforcement of access authorizations to system resources, preventing unauthenticated access to arbitrary files via the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability enables unauthenticated arbitrary file reads on the server, facilitating data collection from local system (T1005), discovery of credentials in files (T1081), file and directory discovery (T1083), and exploitation of public-facing web applications (T1190).
NVD Description
Systemic Risk Value <=2.8.0 is vulnerable to Local File Inclusion via /GetFile.aspx?ReportUrl=. An unauthenticated attacker can exploit this issue to read arbitrary system files by supplying a crafted file path, potentially exposing sensitive information.
Deeper analysisAI
CVE-2025-26137, published on 2025-03-18, affects Systemic Risk Value versions <=2.8.0 and involves a Local File Inclusion vulnerability via the /GetFile.aspx?ReportUrl= endpoint. Classified under CWE-98, it allows an unauthenticated attacker to read arbitrary system files by supplying a crafted file path in the ReportUrl parameter. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility, low attack complexity, and no privileges or user interaction required.
An unauthenticated attacker can exploit this issue remotely by sending a malicious request to the vulnerable endpoint, traversing the file system to access sensitive files such as configuration data, logs, or other system resources. Successful exploitation could lead to the disclosure of sensitive information, enabling further reconnaissance or attacks depending on the exposed data.
Further details, including potential proof-of-concept code, are available in the GitHub repository at https://github.com/Arakiba/CVEs/tree/main/CVE-2025-26137. No vendor-specific patches or mitigation guidance are detailed in the provided information.
Details
- CWE(s)