CVE-2025-26138
📋 TL;DR
Systemic Risk Value versions up to 2.8.0 have an improper access control vulnerability in the file download endpoint. Attackers can access unauthorized files by manipulating predictable numerical IDs in the URL parameter. This affects all users of vulnerable versions who handle sensitive files through this application.
💻 Affected Systems
- Systemic Risk Value
📦 What is this software?
Risk Value by Systemic Rm
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of all uploaded files including sensitive documents, credentials, or proprietary data leading to data breach, compliance violations, and reputational damage.
Likely Case
Unauthorized access to confidential files containing business information, personal data, or operational details that could be used for further attacks.
If Mitigated
Limited exposure of non-sensitive files or partial data leakage if proper file classification and access controls are implemented elsewhere.
🎯 Exploit Status
Simple ID enumeration attack requiring no authentication or special tools.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
No official patch available. Upgrade to version >2.8.0 if available, otherwise implement workarounds.
🔧 Temporary Workarounds
Web Application Firewall Rule
allBlock access to vulnerable endpoint or implement rate limiting
WAF specific - configure rule to block /RiskValue/GroupingEntities/Controls/GetFile.aspx
Authentication Enforcement
allRequire authentication for all file access endpoints
Application configuration - enforce authentication middleware
🧯 If You Can't Patch
- Implement proper access control checks in the GetFile.aspx endpoint
- Use unpredictable file identifiers (GUIDs instead of sequential numbers)
🔍 How to Verify
Check if Vulnerable:
Attempt to access files by incrementing/decrementing ID parameter in /RiskValue/GroupingEntities/Controls/GetFile.aspx?ID=
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Verify that file access requires proper authentication and authorization checks
📡 Detection & Monitoring
Log Indicators:
- Multiple sequential requests to GetFile.aspx with different ID parameters
- Access denied errors followed by successful file downloads
Network Indicators:
- Unusual patterns of file download requests
- Bursts of requests to the vulnerable endpoint
SIEM Query:
source="web_logs" AND uri="/RiskValue/GroupingEntities/Controls/GetFile.aspx" AND (status=200 OR status=403) | stats count by client_ip, uri