SB20250513117 - Multiple vulnerabilities in Adobe ColdFusion



SB20250513117 - Multiple vulnerabilities in Adobe ColdFusion

Published: May 13, 2025

Security Bulletin ID SB20250513117
Severity
High
Patch available
YES
Number of vulnerabilities 8
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

High 13% Medium 38% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 8 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2025-43559)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote non-authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.


2) Input validation error (CVE-ID: CVE-2025-43560)

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote privileged user can send a specially crafted request to the application and execute arbitrary code on the system.


3) Improper access control (CVE-ID: CVE-2025-43561)

The vulnerability allows a remote user to read arbitrary files on the system.

The vulnerability exists due to improper access restrictions. A remote privileged user can read contents of arbitrary files on the system.


4) OS Command Injection (CVE-ID: CVE-2025-43562)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote privileged user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.


5) Improper access control (CVE-ID: CVE-2025-43563)

The vulnerability allows a remote user to read arbitrary files on the system.

The vulnerability exists due to improper access restrictions. A remote privileged user can read contents of arbitrary files on the system.


6) Incorrect authorization (CVE-ID: CVE-2025-43564)

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to incorrect authorization. A remote privileged user can execute arbitrary code on the system.


7) Improper access control (CVE-ID: CVE-2025-43565)

The vulnerability allows a remote user to read arbitrary files on the system.

The vulnerability exists due to improper access restrictions. A remote privileged user can read contents of arbitrary files on the system.


8) Path traversal (CVE-ID: CVE-2025-43566)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote privileged user can send a specially crafted HTTP request and read arbitrary files on the system.


Remediation

Install update from vendor's website.