{"id":59606,"date":"2025-07-02T09:29:56","date_gmt":"2025-07-02T07:29:56","guid":{"rendered":"https:\/\/www.usd.de\/?p=59606"},"modified":"2025-07-02T09:29:57","modified_gmt":"2025-07-02T07:29:57","slug":"security-advisories-on-agorum-core-open","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/security-advisories-on-agorum-core-open\/","title":{"rendered":"Security Advisories on Agorum Core Open"},"content":{"rendered":"\n<p>The pentest professionals at&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\" target=\"_blank\" rel=\"noreferrer noopener\">usd HeroLab<\/a>&nbsp;examined Agorum Core Open during the execution of their&nbsp;<a href=\"https:\/\/www.usd.de\/en\/pentest\/\">pentests<\/a>..<\/p>\n\n\n\n<p>While analyzing the software Agorum Core, <a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noopener\">our analysts<\/a> discovered multiple vulnerabilities that, when chained together, allow an unauthenticated attacker to achieve full remote code execution with root privileges. This critical flaw enables complete system compromise without prior authentication.<\/p>\n\n\n\n<p>The vulnerabilities were reported to the vendor as part of the&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>. Detailed information on the advisories can be found here:<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0021\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0021<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Neutralization of Special Elements used in a Command (Command Injection) (CWE-77)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0022\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0022<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Absolute Path Traversal (CWE-36)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0023\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0023\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0023<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Plaintext Storage of a Password (CWE-256)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0024\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0024\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0024<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Restriction of XML External Entity Reference (CWE-611)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0025\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0025\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0025<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Server-Side Request Forgery (SSRF) (CWE-918)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0026\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0026\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0026<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) (CWE-79)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0027\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0027\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0027<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Absolute Path Traversal (CWE-36)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0028\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0028\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0028<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Incorrect Authorization (CWE-863)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0029\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0029\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0029<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Dependency on Vulnerable Third-Party Component (CWE-1395)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0030\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2025-0030\/\" target=\"_blank\" rel=\"noopener\">usd-2025-0030<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Agorum Core Open<\/td><td class=\"has-text-align-center\" data-align=\"center\">Unauthenticated Remote Code Execution<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">About usd HeroLab Security Advisories<\/h2>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pentest professionals at&nbsp;usd HeroLab&nbsp;examined Agorum Core Open during the execution of their&nbsp;pentests.. While analyzing the software Agorum Core, our analysts discovered multiple vulnerabilities that, when chained together, allow an unauthenticated attacker to achieve full remote code execution with root privileges. This critical flaw enables complete system compromise without prior authentication. The vulnerabilities were reported [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":46998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373,374,1674,10757],"tags":[14003,378,9169,380,8541,487,381],"class_list":["post-59606","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-pentests-security-analyses-en","category-security-advisories-en","category-usd-herolab-en","tag-agorum-core-open-en","tag-pentest-en","tag-pentesting-en","tag-security-advisories-en","tag-security-advisory-en","tag-security-analysis-en","tag-security-research-en"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/59606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=59606"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/59606\/revisions"}],"predecessor-version":[{"id":59617,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/59606\/revisions\/59617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/46998"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=59606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=59606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=59606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}