SB2025121022 - Multiple vulnerabilities in Adobe ColdFusion



SB2025121022 - Multiple vulnerabilities in Adobe ColdFusion

Published: December 10, 2025 Updated: February 19, 2026

Security Bulletin ID SB2025121022
Severity
High
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 17% Medium 17% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Arbitrary file upload (CVE-ID: CVE-2025-61808)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload. A remote privileged user can upload a malicious file and execute it on the server.


2) Input validation error (CVE-ID: CVE-2025-61809)

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote privileged user can pass specially crafted input to the application and execute arbitrary code.


3) Deserialization of Untrusted Data (CVE-ID: CVE-2025-61830)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Deserialization of Untrusted Data (CVE-ID: CVE-2025-61810)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote privileged user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Improper access control (CVE-ID: CVE-2025-61811)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote privileged user can bypass implemented security restrictions and gain unauthorized access to the application.


6) Input validation error (CVE-ID: CVE-2025-61812)

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote privileged user can pass specially crafted input to the application and execute arbitrary code.


7) XML External Entity injection (CVE-ID: CVE-2025-61813)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input. A remote attacker can pass a specially crafted XML code to the affected application and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


8) XML External Entity injection (CVE-ID: CVE-2025-61821)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input. A remote attacker can pass a specially crafted XML code to the affected application and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


9) Input validation error (CVE-ID: CVE-2025-61822)

The vulnerability allows a remote user to write arbitrary files.

The vulnerability exists due to insufficient validation of user-supplied input. A remote privileged can write arbitrary files to the system.


10) XML External Entity injection (CVE-ID: CVE-2025-61823)

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input. A remote user can pass a specially crafted XML code to the affected application and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


11) Improper access control (CVE-ID: CVE-2025-64897)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain unauthorized access to the application.


12) Insufficiently protected credentials (CVE-ID: CVE-2025-64898)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficiently protected credentials. A remote non-authenticated attacker can unauthorized access to the application. 


Remediation

Install update from vendor's website.