CVE-2025-5454

MEDIUM

Axis ACAP - Path Traversal

Title source: llm
STIX 2.1

Description

An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

Scores

CVSS v3 6.4
EPSS 0.0001
EPSS Percentile 3.1%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-35
Status published
Products (1)
axis/axis_os 12.0.0 - 12.6.18
Published Nov 11, 2025
Tracked Since Feb 18, 2026