CVE-2025-11898

Agentflow · Agentflow Multiple Products

A high-severity vulnerability has been discovered in multiple Agentflow products, identified as CVE-2025-11898.

Executive summary

A high-severity vulnerability has been discovered in multiple Agentflow products, identified as CVE-2025-11898. This flaw allows a remote attacker, without needing any login credentials, to read arbitrary files from the underlying server. Successful exploitation could lead to the exposure of sensitive system data, user credentials, and confidential business information, posing a significant risk of a data breach.

Vulnerability

This vulnerability is an Arbitrary File Reading flaw caused by improper handling of user-supplied input, specifically a Relative Path Traversal weakness. An unauthenticated remote attacker can craft a malicious HTTP request containing "dot-dot-slash" (../) sequences. This tricks the application into navigating outside of the intended web directory, allowing the attacker to specify a path to any file on the server's file system that the web server process has permission to read, and subsequently download its contents.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could lead to a significant data breach, exposing sensitive corporate data, application source code, and system configuration files. Specific risks include the theft of credentials (such as database connection strings or service account passwords), intellectual property, and personally identifiable information (PII). This could result in further network compromise, financial loss, reputational damage, and potential regulatory penalties.

Remediation

Immediate Action: The primary remediation is to identify all vulnerable Agentflow instances and apply the security updates provided by the vendor immediately. After patching, review web server and application access logs for any signs of exploitation attempts that may have occurred prior to the update.

Proactive Monitoring:

  • Log Analysis: Scrutinize web server access logs for HTTP requests containing path traversal patterns (e.g., ../, ..%2f, ..\\, ..%5c) in URL parameters or other input fields.
  • Network Security: Implement and monitor Web Application Firewall (WAF) and Intrusion Detection/Prevention System (IDS/IPS) signatures designed to detect and block path traversal attacks.
  • File Integrity Monitoring (FIM): Monitor for unusual read access to sensitive system files (e.g., /etc/passwd, C:\Windows\win.ini, application config files) by the web server's user account.

Compensating Controls: If patching cannot be performed immediately, the following controls can help mitigate risk:

  • Web Application Firewall (WAF): Deploy a WAF with a strict ruleset to filter and block requests containing path traversal sequences. This acts as a virtual patch.
  • Harden File Permissions: Restrict the file system permissions for the user account running the Agentflow web service, ensuring it only has read access to necessary directories and files.
  • Network Segmentation: Isolate the server hosting the Agentflow application from critical internal network segments to limit an attacker's ability to pivot if the server is compromised.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity (CVSS 7.5) of this unauthenticated remote vulnerability, organizations must treat its remediation as a top priority. It is strongly recommended to identify all affected Agentflow products within the environment and apply the vendor-supplied security updates without delay. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its characteristics make it an attractive target for attackers. Immediate patching and proactive monitoring are critical to prevent the potential compromise of sensitive system data.