Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10097: Code Injection in SimStudioAI sim

0
Medium
VulnerabilityCVE-2025-10097cvecve-2025-10097
Published: Mon Sep 08 2025 (09/08/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SimStudioAI
Product: sim

Description

A vulnerability was identified in SimStudioAI sim up to 1.0.0. This impacts an unknown function of the file apps/sim/app/api/function/execute/route.ts. The manipulation of the argument code leads to code injection. The attack is possible to be carried out remotely.

AI-Powered Analysis

AILast updated: 09/16/2025, 01:03:45 UTC

Technical Analysis

CVE-2025-10097 is a medium-severity code injection vulnerability identified in SimStudioAI's 'sim' product, specifically affecting versions up to 1.0.0. The vulnerability resides in an unspecified function within the file apps/sim/app/api/function/execute/route.ts. The root cause is the improper handling of the 'code' argument, which allows an attacker to inject arbitrary code remotely. This means that an attacker can craft malicious input to the vulnerable API endpoint that processes the 'code' parameter, leading to execution of unauthorized commands or scripts on the server hosting the application. The vulnerability does not require user interaction and can be exploited remotely over the network, with low attack complexity and no privileges required, although some limited privileges may be necessary (PR:L). The CVSS 4.0 vector indicates low impact on confidentiality, integrity, and availability, but the vulnerability still poses a risk of unauthorized code execution. No known exploits are currently reported in the wild, and no patches or mitigations have been published yet. The vulnerability affects a specific file path in the SimStudioAI sim application, which suggests it is part of the API function execution logic, likely a critical component for running simulation or AI-related code snippets. The lack of detailed CWE classification limits precise technical characterization, but the nature of code injection typically allows attackers to execute arbitrary commands, potentially leading to system compromise, data leakage, or service disruption depending on the environment and privileges of the application process.

Potential Impact

For European organizations using SimStudioAI sim version 1.0.0 or earlier, this vulnerability could lead to unauthorized remote code execution on servers running the affected software. This could compromise the confidentiality, integrity, and availability of sensitive simulation data and AI models, which may be critical for research, development, or operational decision-making. Organizations in sectors such as engineering, manufacturing, automotive, aerospace, and academic research that rely on simulation tools could face operational disruptions or intellectual property theft. The medium severity rating suggests that while the impact is not catastrophic, exploitation could still enable attackers to pivot within the network or exfiltrate sensitive information. Given the remote exploitability and lack of user interaction, attackers could automate attacks at scale, increasing risk. The absence of known exploits in the wild currently reduces immediate risk but also means organizations should proactively address the vulnerability before it is weaponized. Additionally, compliance with European data protection regulations (e.g., GDPR) may be impacted if personal or sensitive data processed by the application is exposed or altered.

Mitigation Recommendations

European organizations should immediately inventory their environments to identify any deployments of SimStudioAI sim version 1.0.0 or earlier. Until an official patch is released, organizations should implement strict network-level controls to restrict access to the vulnerable API endpoint, such as IP whitelisting, VPN-only access, or firewall rules limiting inbound traffic. Application-layer protections like Web Application Firewalls (WAFs) should be configured to detect and block suspicious payloads targeting the 'code' parameter. Code review and static analysis of the affected component can help identify unsafe input handling practices, and temporary code-level mitigations such as input validation, sanitization, or disabling the vulnerable functionality may be considered. Monitoring and logging should be enhanced to detect anomalous API requests or unexpected code execution patterns. Organizations should also engage with SimStudioAI for timely patch updates and apply them promptly once available. Finally, conducting penetration testing focused on this vulnerability can help validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T09:54:53.415Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf0899d5a2966cfc8193ee

Added to database: 9/8/2025, 4:47:21 PM

Last enriched: 9/16/2025, 1:03:45 AM

Last updated: 10/29/2025, 9:51:01 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats