Accela Automation Platform 22.2.3.0.230103 contains multiple vulnerabilities in the Test Script feature. An authenticated administrative user can execute arbitrary Java code on the server, resulting in remote code execution. In addition, improper input validation allows for arbitrary file write and server-side request forgery (SSRF), enabling interaction with internal or external systems. Successful exploitation can lead to full server compromise, unauthorized access to sensitive data, and further network exploitation.
References
Link | Resource |
---|---|
https://medium.com/@anvarkh/cve-2025-57644-remote-code-execution-ssrf-in-accela-eedc6bc4adfb | Third Party Advisory Mitigation |
https://www.accela.com | Product |
Configurations
History
17 Oct 2025, 14:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/@anvarkh/cve-2025-57644-remote-code-execution-ssrf-in-accela-eedc6bc4adfb - Third Party Advisory, Mitigation | |
References | () https://www.accela.com - Product | |
First Time |
Accela automation Platform
Accela |
|
CPE | cpe:2.3:a:accela:automation_platform:22.2.3.0.230103:*:*:*:*:*:*:* |
19 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-19 16:15
Updated : 2025-10-17 14:21
NVD link : CVE-2025-57644
Mitre link : CVE-2025-57644
CVE.ORG link : CVE-2025-57644
JSON object : View
Products Affected
accela
- automation_platform