Description
Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30.
Problem types
CWE-1392 Use of Default Credentials
Product status
Any version before Release 30
Release 30
Credits
Matthew Galligan, CISA Rapid Action Force (RAF)
References
wiki.agiloft.com/display/HELP/What's+New:+CVE+Resolution (url)
raw.githubusercontent.com/...IT/white/2025/va-25-239-01.json (url)
www.cve.org/CVERecord?id=CVE-2025-35114 (url)