CVE-2025-46067

8.2 HIGH

📋 TL;DR

A vulnerability in Automai Director v.25.2.0 allows remote attackers to escalate privileges and access sensitive information by uploading a malicious JavaScript file. This affects organizations using Automai Director for automation and RPA workflows. Attackers can potentially gain administrative control over the system.

💻 Affected Systems

Products:
  • Automai Director
Versions: v.25.2.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Automai Director v.25.2.0. Other versions may be affected but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative access, data exfiltration, and lateral movement across connected systems.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive automation data, credentials, and business process information.

🟢

If Mitigated

Limited impact with proper file upload restrictions and privilege separation in place.

🌐 Internet-Facing: HIGH - Remote exploitation possible if system is exposed to internet.
🏢 Internal Only: HIGH - Internal attackers can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires file upload capability. The GitHub gist shows proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.automai.com/

Restart Required: No

Instructions:

Check Automai website for security updates. No official patch confirmed as of analysis date.

🔧 Temporary Workarounds

Restrict JavaScript file uploads

all

Block upload of .js files through web application firewall or server configuration

Implement strict file type validation

all

Validate file extensions and MIME types before accepting uploads

🧯 If You Can't Patch

  • Isolate Automai Director systems from internet and restrict internal network access
  • Implement strict access controls and monitor for suspicious file upload activities

🔍 How to Verify

Check if Vulnerable:

Check Automai Director version in administration panel or configuration files

Check Version:

Check Automai Director web interface or consult installation documentation

Verify Fix Applied:

Verify version is updated beyond v.25.2.0 and test file upload restrictions

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads, especially .js files
  • Privilege escalation attempts in audit logs

Network Indicators:

  • Unexpected outbound connections from Automai Director
  • File upload requests to Automai endpoints

SIEM Query:

source="automai" AND (file_upload="*.js" OR privilege_change="admin")

🔗 References

📤 Share & Export