Cyber Posture

CVE-2025-26356

High

Published: 12 February 2025

Published
12 February 2025
Modified
28 October 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0175 82.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-26356 is a path traversal vulnerability classified under CWE-35, present in the setActive endpoint of the maxtime/api/database/database.lua component in Q-Free MaxTime versions less than or equal to 2.11.0. Published on 2025-02-12, this flaw enables an authenticated remote attacker to overwrite sensitive files by sending crafted HTTP requests, potentially leading to unauthorized modifications within the application's file system.

The vulnerability can be exploited by a remote attacker who possesses high privileges (PR:H), requiring network access (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation remains confined to the affected component (S:U) but yields high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in its CVSS v3.1 base score of 7.2. Successful attacks could allow the overwriting of critical files, compromising system integrity and potentially enabling further malicious actions.

Mitigation guidance and additional details are available in the vulnerability advisory from Nozomi Networks at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26356.

Details

CWE(s)
CWE-35

Affected Products

q-free
maxtime
≤ 2.11.0

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Path traversal enables arbitrary overwrite of sensitive files, facilitating exploitation for privilege escalation (T1068), data destruction through overwriting/corruption (T1485), and stored data manipulation (T1565.001).

References