CVE-2025-12480
Gladinet Triofox vulnerability analysis and mitigation

Overview

CVE-2025-12480 is an Improper Access Control vulnerability affecting Triofox versions prior to 16.7.10368.56560. The vulnerability allows unauthenticated attackers to access initial setup pages even after setup is complete. The flaw was discovered and disclosed in July 2025, with active exploitation observed as early as August 24, 2025. The vulnerability affects Gladinet's Triofox file-sharing and remote access platform, which is used by medium and large businesses for secure file sharing and VPN-less access (NVD, HelpNet Security).

Technical details

The vulnerability stems from an improper access control mechanism in the CanRunCriticalPage() function within GladPageUILib.GladBasePage class. The flaw allows attackers to bypass authentication by conducting an HTTP Host header attack, specifically by setting the Host value to 'localhost'. This bypass grants access to the AdminDatabase.aspx page, enabling unauthorized access to configuration pages. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N (Google Cloud Blog).

Impact

The vulnerability allows attackers to bypass authentication and access the application's configuration pages, enabling the creation of unauthorized administrator accounts. Once access is gained, attackers can upload and execute arbitrary payloads through the built-in anti-virus feature, which runs with SYSTEM privileges. This access can lead to full system compromise, allowing attackers to deploy remote access tools, conduct reconnaissance, and potentially escalate privileges within the network (Google Cloud Blog).

Mitigation and workarounds

Organizations are advised to upgrade to Triofox version 16.7.10368.56560 or later, which patches this vulnerability. Additional recommended mitigations include auditing admin accounts, verifying that Triofox's Anti-virus Engine is not configured to execute unauthorized scripts or binaries, and monitoring for anomalous outbound SSH traffic. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply patches by December 3, 2025 (CISA).

Additional resources


SourceThis report was generated using AI

Related Gladinet Triofox vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-30406CRITICAL9.8
  • Gladinet CentreStackGladinet CentreStack
  • cpe:2.3:a:gladinet:centrestack
YesYesApr 03, 2025
CVE-2025-12480CRITICAL9.1
  • Gladinet TriofoxGladinet Triofox
    YesYesNov 10, 2025

    Free Vulnerability Assessment

    Benchmark your Cloud Security Posture

    Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

    Request assessment

    Get a personalized demo

    Ready to see Wiz in action?

    "Best User Experience I have ever seen, provides full visibility to cloud workloads."
    David EstlickCISO
    "Wiz provides a single pane of glass to see what is going on in our cloud environments."
    Adam FletcherChief Security Officer
    "We know that if Wiz identifies something as critical, it actually is."
    Greg PoniatowskiHead of Threat and Vulnerability Management