Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-61809— ColdFusion | Improper Input Validation (CWE-20)

CVSS 9.1 · Critical EPSS 0.59% · P69
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-61809

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ColdFusion | Improper Input Validation (CWE-20)
Source: NVD (National Vulnerability Database)
Vulnerability Description
ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Improper Input Validation vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read and write access. Exploitation of this issue does not require user interaction and scope is unchanged.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Adobe ColdFusion 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Adobe ColdFusion是美国奥多比(Adobe)公司的一套快速应用程序开发平台。该平台包括集成开发环境和脚本语言。 Adobe ColdFusion 2025.4版本、2023.16版本、2021.22版本及之前版本存在输入验证错误漏洞,该漏洞源于输入验证不当,可能导致安全功能绕过。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
AdobeColdFusion 0 ~ 2021.22 -

II. Public POCs for CVE-2025-61809

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-61809

登录查看更多情报信息。

Same Patch Batch · Adobe · 2025-12-09 · 20 CVEs total

CVE-2025-618119.1 CRITICALColdFusion | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'
CVE-2025-618089.1 CRITICALColdFusion | Unrestricted Upload of File with Dangerous Type (CWE-434)
CVE-2025-618128.4 HIGHColdFusion | Improper Input Validation (CWE-20)
CVE-2025-618108.4 HIGHColdFusion | Deserialization of Untrusted Data (CWE-502)
CVE-2025-618138.2 HIGHColdFusion | Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)
CVE-2025-647857.8 HIGHAcrobat Reader | Untrusted Search Path (CWE-426)
CVE-2025-648997.8 HIGHAcrobat Reader | Out-of-bounds Read (CWE-125)
CVE-2025-647837.8 HIGHDNG SDK | Integer Overflow or Wraparound (CWE-190)
CVE-2025-647847.1 HIGHDNG SDK | Heap-based Buffer Overflow (CWE-122)
CVE-2025-648937.1 HIGHDNG SDK | Out-of-bounds Read (CWE-125)
CVE-2025-618216.8 MEDIUMColdFusion | Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)
CVE-2025-618236.2 MEDIUMColdFusion | Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)
CVE-2025-618226.2 MEDIUMColdFusion | Improper Input Validation (CWE-20)
CVE-2025-648975.6 MEDIUMColdFusion | Improper Access Control (CWE-284)
CVE-2025-648965.5 MEDIUMCreative Cloud Desktop | Creation of Temporary File in Directory with Incorrect Permission
CVE-2025-648945.5 MEDIUMDNG SDK | Integer Overflow or Wraparound (CWE-190)
CVE-2025-648984.3 MEDIUMColdFusion | Insufficiently Protected Credentials (CWE-522)
CVE-2025-647863.3 LOWAcrobat Reader | Improper Verification of Cryptographic Signature (CWE-347)
CVE-2025-647873.3 LOWAcrobat Reader | Improper Verification of Cryptographic Signature (CWE-347)

IV. Related Vulnerabilities

V. Comments for CVE-2025-61809

No comments yet


Leave a comment