CVE-2025-24938

The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.
Configurations

No configuration.

History

23 Jul 2025, 19:15

Type Values Removed Values Added
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.4

22 Jul 2025, 13:06

Type Values Removed Values Added
Summary
  • (es) La aplicación web permite que la entrada del usuario se transfiera sin filtrar a un comando que se ejecuta en el sistema operativo subyacente. Un atacante con privilegios elevados (administrador) a la aplicación podría ejecutar comandos en el sistema operativo en el contexto del servidor web. El componente vulnerable está vinculado a la pila de red y el conjunto de posibles atacantes se extiende a toda Internet. Tiene el potencial de inyectar comandos al crear un nuevo usuario desde la Administración de Usuarios.

21 Jul 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-21 07:15

Updated : 2025-07-23 19:15


NVD link : CVE-2025-24938

Mitre link : CVE-2025-24938

CVE.ORG link : CVE-2025-24938


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')