CVE-2025-66208
BaseFortify
Publication date: 2025-12-03
Last updated on: 2025-12-08
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| collabora | online | to 25.04.702 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Configuration-Dependent Remote Code Execution (RCE) due to OS Command Injection in the richdocumentscode proxy of Collabora Online - Built-in CODE Server. It affects versions prior to 25.04.702 and can be exploited via proxy.php and an intermediate reverse proxy, allowing attackers to execute arbitrary commands on the server.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to execute arbitrary operating system commands on the server running Collabora Online, potentially leading to full system compromise, data theft, service disruption, or further attacks within the network.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Collabora Online - Built-in CODE Server to version 25.04.702 or later, as this version contains the fix for the Configuration-Dependent RCE in the richdocumentscode proxy. Additionally, review and secure any reverse proxy configurations that interact with proxy.php to reduce exposure.