The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. An attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver.
History

Wed, 23 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 21 Jul 2025 06:30:00 +0000

Type Values Removed Values Added
Description The web application allows user input to pass unfiltered to a command executed on the underlying operating system. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. An attacker with low privileged access to the application has the potential to execute commands on the operating system under the context of the webserver.
Title Insufficient Validation of Input in the URL
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Nokia

Published: 2025-07-21T06:27:46.093Z

Updated: 2025-07-23T18:45:22.589Z

Reserved: 2025-01-29T07:19:18.312Z

Link: CVE-2025-24936

cve-icon Vulnrichment

Updated: 2025-07-23T18:45:11.384Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-21T07:15:23.890

Modified: 2025-07-23T19:15:32.570

Link: CVE-2025-24936

cve-icon Redhat

No data.