First published: Tue Nov 09 2021(Updated: )
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mendix | >=8.0.0<8.18.13 | |
Mendix | >=9.0.0<9.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42025 is a vulnerability in Mendix Applications using Mendix 8 (All versions < V8.18.13) and Mendix Applications using Mendix 9 (All versions < V9.6.2).
The severity of CVE-2021-42025 is medium with a CVSS score of 6.5.
CVE-2021-42025 affects Mendix Applications built with affected versions of Mendix Studio Pro, where they do not properly control write access for certain client actions.
CVE-2021-42025 affects Mendix 8 (All versions < V8.18.13) and Mendix 9 (All versions < V9.6.2).
To fix CVE-2021-42025, it is recommended to update Mendix Applications to version V8.18.13 or V9.6.2, depending on the affected version.