Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise.CreditsSynacktivMax van der Horst (DIVD)Referenceshttps://csirt.divd.nl/CVE-2023-25914https://csirt.divd.nl/DIVD-2023-00025