CVE-2025-61813

Dec. 12, 2025, 7:07 p.m.

8.2
High

Description

ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files on the server. Exploitation of this issue does not require user interaction and scope is changed.

Product(s) Impacted

Vendor Product Versions
Adobe
  • Coldfusion
  • 2021, 2023, 2025

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-611
Improper Restriction of XML External Entity Reference
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a adobe coldfusion 2021 - / / / / / /
a adobe coldfusion 2021 update1 / / / / / /
a adobe coldfusion 2021 update10 / / / / / /
a adobe coldfusion 2021 update11 / / / / / /
a adobe coldfusion 2021 update12 / / / / / /
a adobe coldfusion 2021 update13 / / / / / /
a adobe coldfusion 2021 update14 / / / / / /
a adobe coldfusion 2021 update15 / / / / / /
a adobe coldfusion 2021 update16 / / / / / /
a adobe coldfusion 2021 update17 / / / / / /
a adobe coldfusion 2021 update18 / / / / / /
a adobe coldfusion 2021 update19 / / / / / /
a adobe coldfusion 2021 update2 / / / / / /
a adobe coldfusion 2021 update20 / / / / / /
a adobe coldfusion 2021 update21 / / / / / /
a adobe coldfusion 2021 update22 / / / / / /
a adobe coldfusion 2021 update3 / / / / / /
a adobe coldfusion 2021 update4 / / / / / /
a adobe coldfusion 2021 update5 / / / / / /
a adobe coldfusion 2021 update6 / / / / / /
a adobe coldfusion 2021 update7 / / / / / /
a adobe coldfusion 2021 update8 / / / / / /
a adobe coldfusion 2021 update9 / / / / / /
a adobe coldfusion 2023 - / / / / / /
a adobe coldfusion 2023 update1 / / / / / /
a adobe coldfusion 2023 update10 / / / / / /
a adobe coldfusion 2023 update11 / / / / / /
a adobe coldfusion 2023 update12 / / / / / /
a adobe coldfusion 2023 update13 / / / / / /
a adobe coldfusion 2023 update14 / / / / / /
a adobe coldfusion 2023 update15 / / / / / /
a adobe coldfusion 2023 update16 / / / / / /
a adobe coldfusion 2023 update2 / / / / / /
a adobe coldfusion 2023 update3 / / / / / /
a adobe coldfusion 2023 update4 / / / / / /
a adobe coldfusion 2023 update5 / / / / / /
a adobe coldfusion 2023 update6 / / / / / /
a adobe coldfusion 2023 update7 / / / / / /
a adobe coldfusion 2023 update8 / / / / / /
a adobe coldfusion 2023 update9 / / / / / /
a adobe coldfusion 2025 - / / / / / /
a adobe coldfusion 2025 update1 / / / / / /
a adobe coldfusion 2025 update2 / / / / / /
a adobe coldfusion 2025 update3 / / / / / /
a adobe coldfusion 2025 update4 / / / / / /

CVSS Score

8.2 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: LOW
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L

    View Vector String

Timeline

Published: Dec. 10, 2025, 12:16 a.m.
Last Modified: Dec. 12, 2025, 7:07 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

psirt@adobe.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.