A critical unauthenticated Local File Inclusion (LFI) vulnerability, tracked as CVE-2025-11371, has been identified in Gladinet’s CentreStack and Triofox platforms. The flaw, affecting versions up to 16.7.10368.56560, allows remote attackers to read sensitive files such as Web.config without authentication. This exposure enables attackers to retrieve the machine key used for ASP.NET ViewState validation, which can then be chained with CVE-2025-30406—a previously disclosed deserialization vulnerability—to achieve remote code execution (RCE).
Exploitation of this flaw was first detected on September 27, 2025, when a CentreStack instance patched for CVE-2025-30406 was compromised through this new LFI pathway. As of mid-October 2025, the vulnerability remains unpatched publicly, creating an urgent risk for enterprise environments running file-sharing and remote-access deployments of CentreStack and Triofox.
Gladinet has acknowledged awareness of the issue and begun communicating with affected customers, but until an official fix is released, organizations remain vulnerable to chained RCE attacks combining CVE-2025-11371 with CVE-2025-30406.
The CVE-2025-11371 flaw resides in default configurations of Gladinet CentreStack and TrioFox, where attackers can exploit a vulnerable UploadDownloadProxy endpoint to access files on the server. Through this path, they can extract Web.config, a file that contains the ASP.NET machine key. This key is critical for ViewState integrity and validation.
Once obtained, the machine key allows an attacker to forge malicious ViewState payloads that exploit CVE-2025-30406—a related vulnerability stemming from hardcoded cryptographic keys—to escalate the attack from information disclosure to remote code execution.
While the CVSS score (~6.1) reflects a moderate severity based solely on the LFI risk, the real-world impact becomes critical when the flaw is weaponized through chaining. The vulnerability effectively reopens the RCE attack surface even in systems already updated to mitigate CVE-2025-30406.
Vulnerability Metadata:
Gladinet.Cloud.Proxy.TempHandler
. This blocks unauthenticated file access and prevents exploitation of the vulnerable LFI endpoint.Get through updates and upcoming events, and more directly in your inbox