CVE-2025-47286
BaseFortify
Publication date: 2025-11-10
Last updated on: 2025-11-21
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| combodo | itop | to 2.7.13 (exc) |
| combodo | itop | From 3.0.0 (inc) to 3.2.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Combodo iTop versions prior to 2.7.13 and 3.2.2, where an administrator can execute arbitrary code on the server by editing the configuration of the iTop instance. The issue arises because the configuration parameter is not properly escaped or checked before executing commands based on it. Versions 2.7.13 and 3.2.2 address this by escaping and validating the configuration parameter before execution.
How can this vulnerability impact me? :
This vulnerability can allow an administrator to execute arbitrary code on the server hosting the iTop application. This could lead to unauthorized actions, data compromise, service disruption, or further exploitation of the server environment.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Combodo iTop to version 2.7.13 or 3.2.2 or later, as these versions include fixes that escape and check the configuration parameter before executing commands, preventing code execution by an administrator.