CVE-2025-5952
Description
A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release. Additional countermeasures have been added in 6.15-8.
CWE
- CWE-78 — OS Command Injection
- CWE-77 — Command Injection
Affected
- n/a / Zend.To — v=6.10-6 Beta [affected]
CVSS
- 4.0 score=6.9 severity=MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P - 3.1 score=7.3 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C - 3.0 score=7.3 severity=HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C - 2.0 score=7.5 severity=
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C
References
- https://vuldb.com/?id.311789 vdb-entry, technical-description
- https://vuldb.com/?ctiid.311789 signature, permissions-required
- https://vuldb.com/?submit.589178 third-party-advisory
- https://matheuscezar.github.io/2025/05/24/0-day-in-zend-to.html exploit
Source
cvelistV5-main/cves/2025/5xxx/CVE-2025-5952.json