CVE-2025-40592

6.1 MEDIUM

📋 TL;DR

A zip path traversal vulnerability in Mendix Studio Pro allows attackers to write or modify arbitrary files outside a developer's project directory by distributing malicious modules. This affects developers using vulnerable versions of Mendix Studio Pro across multiple major releases. The vulnerability could lead to arbitrary file writes with developer-level privileges.

💻 Affected Systems

Products:
  • Mendix Studio Pro
Versions: Mendix Studio Pro 8 (< 8.18.35), 9 (< 9.24.35), 10 (< 10.23.0), 10.6 (< 10.6.24), 10.12 (< 10.12.17), 10.18 (< 10.18.7), 11 (< 11.0.0)
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is triggered during module installation from sources like Mendix Marketplace.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could write malicious files to system directories, potentially leading to remote code execution, data theft, or complete system compromise on the developer's machine.

🟠

Likely Case

Attackers could modify configuration files, install backdoors, or steal sensitive project data from developer workstations.

🟢

If Mitigated

With proper controls, the impact is limited to isolated development environments without access to production systems or sensitive data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires distributing a malicious module and convincing a developer to install it. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Mendix Studio Pro 8.18.35, 9.24.35, 10.23.0, 10.6.24, 10.12.17, 10.18.7, 11.0.0

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-627195.html

Restart Required: Yes

Instructions:

1. Open Mendix Studio Pro. 2. Go to Help > Check for Updates. 3. Download and install the latest version for your major release. 4. Restart Studio Pro after installation.

🔧 Temporary Workarounds

Restrict Module Sources

all

Only install modules from trusted sources and avoid installing modules from unknown or unverified publishers.

Sandbox Development Environment

all

Run Mendix Studio Pro in a sandboxed or isolated environment to limit the impact of potential file writes.

🧯 If You Can't Patch

  • Implement strict access controls on developer workstations to limit file system access
  • Monitor for suspicious file writes outside project directories using file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check your Mendix Studio Pro version against the affected version ranges listed above.

Check Version:

In Mendix Studio Pro, go to Help > About Mendix Studio Pro

Verify Fix Applied:

Verify that your Studio Pro version is equal to or greater than the patched versions listed in fix_official.patch_version.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file writes outside project directories during module installation
  • Module installation failures with path traversal errors

Network Indicators:

  • Downloads of modules from untrusted sources or unusual locations

SIEM Query:

File creation events where path contains '..' or attempts to write outside expected project directories

🔗 References

📤 Share & Export