Agiloft Release 28 does not properly neutralize special elements used in an EUI template engine, allowing an authenticated attacker to achieve remote code execution by loading a specially crafted payload. Users should upgrade to Agiloft Release 31.CreditsMatthew Galligan, CISA Rapid Action Force (RAF)Referenceshttps://wiki.agiloft.com/display/HELP/What%27s+New%3A+CVE+Resolutionhttps://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-25-239-01.jsonhttps://www.cve.org/CVERecord?id=CVE-2025-35113