The upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution.
History

Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Welotec
Welotec smartems
Vendors & Products Welotec
Welotec smartems

Wed, 10 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Sep 2025 07:00:00 +0000

Type Values Removed Values Added
Description The upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution.
Title Path Traversal via 'Upload-Key' in SmartEMS Upload Handling
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-09-10T06:48:10.130Z

Updated: 2025-09-10T19:27:45.979Z

Reserved: 2025-04-16T11:17:48.311Z

Link: CVE-2025-41714

cve-icon Vulnrichment

Updated: 2025-09-10T19:27:42.295Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-10T07:15:44.733

Modified: 2025-09-11T17:14:10.147

Link: CVE-2025-41714

cve-icon Redhat

No data.