CVE-2025-41723
Published: 22 October 2025
Summary
CVE-2025-41723 is a critical-severity Path Traversal: '.../...//' (CWE-35) vulnerability in Certvde (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates directory traversal in the importFile SOAP method by validating file path inputs to block bypass of path restrictions and prevent arbitrary file uploads.
Limits permitted actions without authentication, preventing unauthenticated remote attackers from accessing and exploiting the vulnerable importFile SOAP method.
Enforces approved authorizations for access to system resources, blocking file writes to arbitrary locations even if path traversal inputs are processed.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a directory traversal in a public-facing SOAP web service (importFile method), enabling unauthenticated remote arbitrary file uploads, which directly maps to exploitation of public-facing applications.
NVD Description
The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.
Deeper analysisAI
CVE-2025-41723 is a directory traversal vulnerability in the importFile SOAP method, enabling an unauthenticated remote attacker to bypass path restrictions and upload files to arbitrary locations on the affected system. Published on 2025-10-22 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it is associated with CWE-35 (Path Traversal).
An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows arbitrary file uploads, potentially leading to high confidentiality, integrity, and availability impacts, such as overwriting critical files or deploying malicious payloads.
For mitigation details, refer to the vendor advisory at https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json.
Details
- CWE(s)