The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.
History

Wed, 23 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 21 Jul 2025 07:00:00 +0000

Type Values Removed Values Added
Description The web application allows user input to pass unfiltered to a command executed on the underlying operating system. An attacker with high privileged access (administrator) to the application has the potential execute commands on the operating system under the context of the webserver. The vulnerable component is bound to the network stack and the set of possible attackers extends up to and including the entire Internet. Has the potential to inject command while creating a new User from User Management.
Title Insufficient Validation of Input while user creation
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Nokia

Published: 2025-07-21T06:33:56.306Z

Updated: 2025-07-23T18:39:08.345Z

Reserved: 2025-01-29T07:19:18.312Z

Link: CVE-2025-24938

cve-icon Vulnrichment

Updated: 2025-07-23T18:34:18.601Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-21T07:15:24.130

Modified: 2025-07-23T19:15:32.963

Link: CVE-2025-24938

cve-icon Redhat

No data.