CVE-2025-35056

5.0 MEDIUM
Published: October 09, 2025 Modified: October 22, 2025

Description

Newforma Info Exchange (NIX) '/UserWeb/Common/MarkupServices.ashx' 'StreamStampImage' accepts an encrypted file path and returns an image of the specified file. An authenticated attacker can read arbitrary files subject to the privileges of NIX, typically 'NT AUTHORITY\NetworkService', and the ability of StreamStampImage to process the file. The encrypted file path can be generated using the shared, hard-coded secret key described in CVE-2025-35052. This vulnerability cannot be exploited as an 'anonymous' user as described in CVE-2025-35062.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-282-01.json
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2025-35056
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory
https://www.cve.org/CVERecord?id=CVE-2025-35062
Source: 9119a7d8-5eab-497f-8521-727c672e3725
Third Party Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.0 / 10.0
EPSS (Exploit Probability)
0.1%
20th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

newforma