CVE-2025-69212
BaseFortify
Publication date: 2026-02-06
Last updated on: 2026-02-09
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| devcode | openstamanager | to 2.9.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-69212 is a critical OS Command Injection vulnerability in OpenSTAManager (versions 2.9.8 and earlier) affecting the P7M (signed XML) file decoding functionality.
The vulnerability occurs because the decodeP7M() function directly passes a user-controlled filename parameter into the PHP exec() function without proper sanitization, allowing an attacker to inject arbitrary system commands.
An authenticated attacker can upload a ZIP file containing a .p7m file with a malicious filename designed to escape the command quotes and execute arbitrary commands on the server.
For example, an attacker can craft a filename that injects a PHP webshell into the server, enabling remote code execution with the privileges of the web server user.
How can this vulnerability impact me? :
This vulnerability can lead to full remote code execution and server compromise.
- Execution of arbitrary system commands as the web server user.
- Data exfiltration and unauthorized access to databases.
- Potential privilege escalation if the web server runs with elevated rights.
- Persistence through backdoors such as webshells.
- Lateral movement within the network.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking for the presence of suspicious .p7m files with malicious filenames uploaded via the invoice import functionality, as well as by looking for unexpected files such as webshells created in the server's files directory."}, {'type': 'paragraph', 'content': 'Since the vulnerability involves execution of arbitrary commands through crafted filenames, you can look for unusual files or processes on the server that indicate command injection.'}, {'type': 'list_item', 'content': "Search for suspicious webshell files, for example: `find /path/to/openstamanager/files -name 'SHELL.php'`"}, {'type': 'list_item', 'content': 'Check running processes or recent command history for unexpected commands executed by the web server user (commonly www-data).'}, {'type': 'list_item', 'content': 'Use commands like `ps aux | grep www-data` or `lsof -p $(pidof apache2)` to inspect processes and open files.'}, {'type': 'list_item', 'content': 'Look for uploaded ZIP files containing .p7m files with suspicious filenames by inspecting the importFE_ZIP plugin upload directories.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Immediate mitigation steps include restricting or disabling the invoice import functionality for authenticated users until a patch is available.'}, {'type': 'paragraph', 'content': 'Implement input sanitization on filenames extracted from ZIP archives to allow only safe characters such as alphanumeric characters, dots, dashes, and underscores.'}, {'type': 'paragraph', 'content': "Modify the decodeP7M() function to use PHP's escapeshellarg() to safely escape shell arguments before passing them to the exec() function."}, {'type': 'paragraph', 'content': 'Monitor the server for any signs of compromise, such as unexpected files or processes, and remove any detected webshells or malicious files.'}, {'type': 'paragraph', 'content': 'Limit privileges of the web server user to minimize impact in case of exploitation.'}] [1]