iFAX Solutions Security Advisory - CVE-2025-1782

Product

HylaFAX Enterprise Web Interface / AvantFAX

Summary

Unsanitized language form field allowing remote code execution

Nature of Advisory

Remote code execution

Susceptibility

All installs are vulnerable to attackers with a valid user account.

Severity

Major

Exploits Known

No

Reported On

Feb 21, 2025

Reported By

Fabian Beskow

Posted On

Apr 8, 2025

Last Updated On

Apr 8, 2025

Advisory Contact

patrice.fournier AT ifax DOT com

CVE Name

CVE-2025-1782

CVSS 3.1 Base Value

9.9

CVSS 3.1 Vector

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

CWE

CWE-94



Description

The language form element is not properly sanitized before being used and can be misused to include an arbitrary file in the PHP code allowing an attacker to do anything as the web server user. Requires attacker to be authenticated with a valid user account.


Resolution

Only accept user provided language value from a list of available languages.


Affected Versions

Product

Release Series


HylaFAX Enterprise Web Interface

1.3.x

1.3.1,1.3.0

HylaFAX Enterprise Web Interface

1.2.x

1.2.0

HylaFAX Enterprise Web Interface

0.x

All releases

AvantFAX

3.4.x

3.4.0

AvantFAX

3.3.x

All releases

AvantFAX

<3.3.0

All releases


Corrected In

Product

Release

HylaFAX Enterprise Web Interface

1.3.2

HylaFAX Enterprise Web Interface

1.2.1

AvantFAX

3.4.1




This document may be superseded by later versions; if so, the latest version will be posted at https://www.ifax.com/security/CVE-2025-1728.html


Revision History

Date

Editor

Revisions Made

Apr 8, 2025

Patrice Fournier

Initial revision








iFAX Solutions Security Advisory - CVE-2025-1728
Copyright © 2025 iFAX Solutions, Inc. All Rights Reserved.
Permission is hereby granted to distribute and publish this advisory in its original, unaltered form.