Security Advisory, weiße Schrift auf dunklem Hintergrund

Security Advisories on Agorum Core Open

2. July 2025

The pentest professionals at usd HeroLab examined Agorum Core Open during the execution of their pentests..

While analyzing the software Agorum Core, our analysts discovered multiple vulnerabilities that, when chained together, allow an unauthenticated attacker to achieve full remote code execution with root privileges. This critical flaw enables complete system compromise without prior authentication.

The vulnerabilities were reported to the vendor as part of the Responsible Disclosure Policy. Detailed information on the advisories can be found here:

IDProductVulnerability Type
usd-2025-0021Agorum Core OpenImproper Neutralization of Special Elements used in a Command (Command Injection) (CWE-77)
usd-2025-0022Agorum Core OpenAbsolute Path Traversal (CWE-36)
usd-2025-0023Agorum Core OpenPlaintext Storage of a Password (CWE-256)
usd-2025-0024Agorum Core OpenImproper Restriction of XML External Entity Reference (CWE-611)
usd-2025-0025Agorum Core OpenServer-Side Request Forgery (SSRF) (CWE-918)
usd-2025-0026Agorum Core OpenImproper Neutralization of Input During Web Page Generation (Cross-site Scripting) (CWE-79)
usd-2025-0027Agorum Core OpenAbsolute Path Traversal (CWE-36)
usd-2025-0028Agorum Core OpenIncorrect Authorization (CWE-863)
usd-2025-0029Agorum Core OpenDependency on Vulnerable Third-Party Component (CWE-1395)
usd-2025-0030Agorum Core OpenUnauthenticated Remote Code Execution

About usd HeroLab Security Advisories

In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.

We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.

Always in the name of our mission: “more security.”

Also interesting:

Security Advisories on Entra ID and Tenable Nessus Manager

Security Advisories on Entra ID and Tenable Nessus Manager

The pentest professionals at usd HeroLab identified a vulnerability during a cloud pentest that allows the circumvention of conditional access policies for privileged identities in Microsoft Entra ID through the combination of role-based policy assignment and...

Categories

Categories