CVE-2025-34088
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-03

Last updated on: 2025-09-16

Assigner: VulnCheck

Description
An authenticated remote code execution vulnerability exists in Pandora FMS version 7.0NG and earlier. The net_tools.php functionality allows authenticated users to execute arbitrary OS commands via the select_ips parameter when performing network tools operations, such as pinging. This occurs because user input is not properly sanitized before being passed to system commands, enabling command injection.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-03
Last Modified
2025-09-16
Generated
2026-05-07
AI Q&A
2025-07-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pandorafms pandora_fms to 7.0_ng (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-34088 is an authenticated remote code execution vulnerability in Pandora FMS version 7.0NG and earlier. It exists in the net_tools.php functionality, specifically in the network tools operations like ping. Authenticated users with valid credentials can exploit this flaw by injecting arbitrary operating system commands through the select_ips parameter because the input is not properly sanitized before being passed to system commands. This allows attackers to execute OS commands remotely on the affected system. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can have a severe impact as it allows an authenticated attacker with high privileges to execute arbitrary OS commands remotely on the Pandora FMS server. This can lead to full system compromise, including unauthorized access to sensitive data, disruption of monitoring services, installation of malware, and potential lateral movement within the network. The CVSS score of 8.6 reflects its high severity and the significant impact on confidentiality, integrity, and availability of the system. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves verifying if your Pandora FMS instance is version 7.0NG or earlier and checking for signs of exploitation via the net_tools.php component, specifically the network tools extension. Since the vulnerability requires authenticated access, monitoring for unusual POST requests to index.php with parameters targeting network_tools and the select_ips parameter containing suspicious command injection patterns (e.g., semicolon-prefixed commands) can help detect exploitation attempts. Using the Metasploit module (Resource 2 and 3) can also help verify the vulnerability by attempting authentication and version checks. Specific commands to detect exploitation might include monitoring web server logs for POST requests to index.php with select_ips parameters containing shell metacharacters. For example, on a Linux system, you could run: 1. `grep 'select_ips=.*;' /var/log/apache2/access.log` 2. `grep 'POST /index.php' /var/log/apache2/access.log | grep select_ips` Additionally, checking the Pandora FMS version via the web interface or by fetching the version string from index.php can confirm if the system is vulnerable. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Restrict access to Pandora FMS to trusted users only, ensuring that only authorized users with high privileges can authenticate. 2. Upgrade Pandora FMS to a version later than 7.0NG where this vulnerability is fixed (if available). 3. If an upgrade is not immediately possible, restrict or disable the network tools functionality (especially the ping module) to prevent exploitation of the select_ips parameter. 4. Monitor and audit authentication logs and web server logs for suspicious activity related to the network_tools extension and command injection attempts. 5. Apply network-level controls such as firewall rules to limit access to the Pandora FMS web interface. 6. Consider using web application firewalls (WAF) to detect and block command injection patterns in HTTP requests. 7. Change and strengthen user credentials to prevent unauthorized access. These steps help reduce the risk of exploitation while a permanent fix or patch is applied. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart