CVE-2025-11898

7.5 HIGH

📋 TL;DR

Agentflow software by Flowring contains an unauthenticated arbitrary file reading vulnerability via relative path traversal. Remote attackers can exploit this to download sensitive system files without authentication. Organizations using vulnerable Agentflow versions are affected.

💻 Affected Systems

Products:
  • Agentflow by Flowring
Versions: Specific versions not detailed in references; all versions before patched version are likely affected.
Operating Systems: Likely cross-platform as vulnerability is in application logic
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects unauthenticated access paths; any exposed Agentflow instance is vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading of sensitive files like /etc/shadow, SSH keys, configuration files with credentials, leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive configuration files, application secrets, and system information that could enable further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, file system permissions, and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are typically easy to exploit with simple HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references; check vendor advisory for exact version.

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10439-0bd15-2.html

Restart Required: Yes

Instructions:

1. Check vendor advisory for patched version. 2. Download and apply the patch from Flowring. 3. Restart Agentflow services. 4. Verify the fix by testing for path traversal.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to Agentflow to trusted IPs only.

Use firewall rules: iptables -A INPUT -p tcp --dport [Agentflow_port] -s [trusted_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [Agentflow_port] -j DROP

Web Server Configuration

all

Configure web server to block path traversal patterns.

For Apache: add 'RewriteRule \.\./ - [F]' to .htaccess
For Nginx: add 'location ~ \.\./ { deny all; }' to config

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Agentflow from sensitive systems.
  • Deploy a WAF with rules to detect and block path traversal attempts.

🔍 How to Verify

Check if Vulnerable:

Test with HTTP request: curl -v 'http://[target]/[path]?file=../../../../etc/passwd' and check for file content in response.

Check Version:

Check Agentflow interface or configuration files for version info; command varies by installation.

Verify Fix Applied:

Repeat vulnerability test; should return error or no file content. Check version matches patched release.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '..' or '../' patterns in URL parameters
  • Unusual file access patterns from unauthenticated sources

Network Indicators:

  • HTTP traffic with path traversal strings in query parameters or paths

SIEM Query:

source="agentflow_logs" AND (url="*..*" OR param="*..*")

🔗 References

📤 Share & Export