A vulnerability exists in the Opto22 Groov Manage REST API on GRV-EPIC and groov RIO Products that allows remote code execution with root privileges. When a POST request is executed against the vulnerable endpoint, the application reads certain header details and unsafely uses these values to build commands, allowing an attacker with administrative privileges to inject arbitrary commands that execute as root.
History

Fri, 21 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in the Opto22 Groov Manage REST API on GRV-EPIC and groov RIO Products that allows remote code execution with root privileges. When a POST request is executed against the vulnerable endpoint, the application reads certain header details and unsafely uses these values to build commands, allowing an attacker with administrative privileges to inject arbitrary commands that execute as root.
Title Command Injection in Opto22 Groov REST API
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2025-11-20T21:32:37.510Z

Updated: 2025-11-21T16:01:40.324Z

Reserved: 2025-11-12T19:41:06.455Z

Link: CVE-2025-13087

cve-icon Vulnrichment

Updated: 2025-11-21T16:01:36.546Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-20T22:15:54.310

Modified: 2025-11-21T15:13:13.800

Link: CVE-2025-13087

cve-icon Redhat

No data.