AI description
CVE-2025-50946 describes an OS command injection vulnerability identified in `github.com/olivetin/olivetin`. The flaw resides within the `ParseRequestURI` function, located in `service/internal/executor/arguments.go`. This vulnerability allows an attacker to execute arbitrary operating system commands on the affected system. The root cause of this issue is insufficient validation of URL-type arguments. Specifically, the `typeSafetyCheckUrl` function, which uses `url.ParseRequestURI`, permits characters such as semicolons that can be leveraged to chain commands in a shell. By crafting a malicious URI, a remote attacker can exploit this weakness to inject and execute commands without requiring authentication.
- Description
- OS Command Injection in Olivetin 2025.4.22 Custom Themes via the ParseRequestURI function in service/internal/executor/arguments.go.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- olivetin
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 2.5
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-78
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
9
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:olivetin:olivetin:2025.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDF7617-F58C-4AB4-8B0F-66DF6472D3DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]