A command injection vulnerability in FTP-Flask-python through 5173b68 allows unauthenticated remote attackers to execute arbitrary OS commands. The /ftp.html endpoint's "Upload File" action constructs a shell command from the ftp_file parameter and executes it using os.system() without sanitization or escaping.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-27500 A command injection vulnerability in FTP-Flask-python through 5173b68 allows unauthenticated remote attackers to execute arbitrary OS commands. The /ftp.html endpoint's "Upload File" action constructs a shell command from the ftp_file parameter and executes it using os.system() without sanitization or escaping.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 10 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 21:00:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability in FTP-Flask-python through 5173b68 allows unauthenticated remote attackers to execute arbitrary OS commands. The /ftp.html endpoint's "Upload File" action constructs a shell command from the ftp_file parameter and executes it using os.system() without sanitization or escaping.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-10T14:06:40.486Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57633

cve-icon Vulnrichment

Updated: 2025-09-10T14:05:47.586Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-09T21:15:38.223

Modified: 2025-09-11T17:14:25.240

Link: CVE-2025-57633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.