CVE-2025-12382
Published: 12 November 2025
Description
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Security Summary
CVE-2025-12382 is an Improper Limitation of a Pathname (Path Traversal) vulnerability, classified under CWE-22, affecting AlgoSec Firewall Analyzer on Linux 64-bit systems. It enables an authenticated user to bypass path restrictions and upload files to a protected directory, facilitating code injection. The vulnerability impacts AlgoSec Firewall Analyzer versions A33.0 (up to build 320) and A33.10 (up to build 210). It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
An attacker with authenticated access (low privileges required) can exploit this over the network with low complexity and no user interaction. By crafting malicious file upload requests that traverse restricted paths, the attacker gains the ability to inject and execute arbitrary code on the server, potentially leading to full system compromise, data exfiltration, or further lateral movement within the environment.
AlgoSec has published a technical advisory detailing the issue at https://techdocs.algosec.com/en/cves/Content/tech-notes/cves/cve-2025-12382.htm, which security practitioners should consult for specific patch information, workarounds, and affected build verification. The vulnerability was publicly disclosed on 2025-11-12.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Path traversal vulnerability in AlgoSec Firewall Analyzer (public-facing web application) enables exploitation (T1190) via authenticated file upload to protected directories, facilitating arbitrary code injection such as web shells (T1100).