CVE-2025-50946

Published Aug 13, 2025

Last updated 7 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-50946 describes an OS command injection vulnerability identified in `github.com/olivetin/olivetin`. The flaw resides within the `ParseRequestURI` function, located in `service/internal/executor/arguments.go`. This vulnerability allows an attacker to execute arbitrary operating system commands on the affected system. The root cause of this issue is insufficient validation of URL-type arguments. Specifically, the `typeSafetyCheckUrl` function, which uses `url.ParseRequestURI`, permits characters such as semicolons that can be leveraged to chain commands in a shell. By crafting a malicious URI, a remote attacker can exploit this weakness to inject and execute commands without requiring authentication.

Description
OS Command Injection in Olivetin 2025.4.22 Custom Themes via the ParseRequestURI function in service/internal/executor/arguments.go.
Source
cve@mitre.org
NVD status
Analyzed
Products
olivetin

Risk scores

CVSS 3.1

Type
Secondary
Base score
6.5
Impact score
2.5
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Severity
MEDIUM

Weaknesses

134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-78

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

9

Configurations