Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated command injection vulnerability exists in OP5 Monitor through version 7.1.9 via the 'cmd_str' parameter in the command_test.php endpoint. A user with access to the web interface can exploit the 'Test this command' feature to execute arbitrary shell commands as the unprivileged web application user. The vulnerability resides in the configuration section of the application and requires valid login credentials with access to the command testing functionality. This issue is fixed in version 7.2.0. | |
Title | OP5 Monitor <= 7.1.9 Authenticated Command Execution via command_test.php | |
Weaknesses | CWE-20 CWE-306 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-07-15T13:39:54.645Z
Reserved: 2025-04-15T19:15:22.560Z
Link: CVE-2025-34115

Updated: 2025-07-15T13:39:47.415Z

Status : Awaiting Analysis
Published: 2025-07-15T13:15:31.437
Modified: 2025-07-15T20:07:28.023
Link: CVE-2025-34115

No data.

No data.