CVE-2025-34030

An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system.
CVSS

No CVSS.

Configurations

No configuration.

History

23 Jun 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-20 19:15

Updated : 2025-06-23 20:16


NVD link : CVE-2025-34030

Mitre link : CVE-2025-34030

CVE.ORG link : CVE-2025-34030


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')