CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-3485: Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability

7.2 CVSS

Description

Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.

The specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524.

Classification

CVE ID: CVE-2025-3485

CVSS Base Severity: HIGH

CVSS Base Score: 7.2

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem Types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Affected Products

Vendor: Allegra

Product: Allegra

Exploit Prediction Scoring System (EPSS)

EPSS Score: 2.98% (probability of being exploited)

EPSS Percentile: 85.9% (scored less or equal to compared to others)

EPSS Date: 2025-06-27 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3485
https://www.zerodayinitiative.com/advisories/ZDI-25-254/
https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-2

Timeline