CVE-2025-70995

HIGH

Aranda Service Desk 8.6 - Authenticated RCE

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2025-70995. PoCs published by 0xcronos.

AI-analyzed exploit summary This repository contains a functional exploit for CVE-2025-70995, demonstrating how an authenticated attacker can upload a malicious web.config file to achieve remote code execution in Aranda Service Desk Web Edition (ASDK API). The PoC includes detailed HTTP requests and payloads to manipulate the ASP.NET runtime context.

Description

An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafted POST request to /ASDKAPI/api/v8.6/item/addfile, which is processed by the ASP.NET runtime. The uploaded configuration file alters the execution context of the upload directory, enabling compilation and execution of attacker-controlled code (e.g., generation of an .aspx webshell). This allows remote command execution on the server without user interaction beyond authentication, impacting both On-Premise and SaaS deployments. The vendor has fixed the issue in Aranda Service Desk V8 8.30.6.

Exploits (1)

nomisec WORKING POC
by 0xcronos · poc
https://github.com/0xcronos/CVE

This repository contains a functional exploit for CVE-2025-70995, demonstrating how an authenticated attacker can upload a malicious web.config file to achieve remote code execution in Aranda Service Desk Web Edition (ASDK API). The PoC includes detailed HTTP requests and payloads to manipulate the ASP.NET runtime context.

Classification
Working Poc 95%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target: Aranda Service Desk Web Edition (ASDK API)
Auth required
Prerequisites: authenticated access to the ASDK API · ability to send crafted HTTP requests
devstral-2 · analyzed Apr 28, 2026 Full analysis →

Scores

CVSS v3 8.8
EPSS 0.0050
EPSS Percentile 66.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-94
Status published
Published Mar 05, 2026
Tracked Since Mar 06, 2026