Description
An improper access control vulnerability was found in the EZ Sync Manager of ADM, which allows authenticated users to copy arbitrary files from the server file system into their own EZSync folder. The vulnerability is due to a lack of authorization checks on the file parameter of the HTTP request. Attackers can exploit this flaw to access files outside their authorized scope, provided the file has readable permissions for other users on the underlying OS. This can lead to unauthorized exposure of sensitive data.
Affected products and versions include: from ADM 4.1.0 to ADM 4.3.3.RH61 as well as ADM 5.0.0.RIN1 and earlier.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-7699, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-7699 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Insufficient-Authentication
- https://capec.mitre.org/data/definitions/114.html
- https://capec.mitre.org/data/definitions/115.html
- https://capec.mitre.org/data/definitions/151.html
- https://capec.mitre.org/data/definitions/194.html
- https://capec.mitre.org/data/definitions/22.html
- https://capec.mitre.org/data/definitions/57.html
- https://capec.mitre.org/data/definitions/593.html
- https://capec.mitre.org/data/definitions/633.html
- https://capec.mitre.org/data/definitions/650.html
- https://capec.mitre.org/data/definitions/94.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-7699