CVE-2025-10097: Code Injection in SimStudioAI sim
A vulnerability was identified in SimStudioAI sim up to 1.0.0. This impacts an unknown function of the file apps/sim/app/api/function/execute/route.ts. The manipulation of the argument code leads to code injection. The attack is possible to be carried out remotely.
AI Analysis
Technical Summary
CVE-2025-10097 is a medium-severity code injection vulnerability identified in SimStudioAI's 'sim' product, specifically affecting versions up to 1.0.0. The vulnerability resides in an unspecified function within the file apps/sim/app/api/function/execute/route.ts. The root cause is the improper handling of the 'code' argument, which allows an attacker to inject arbitrary code remotely. This means that an attacker can craft malicious input to the vulnerable API endpoint that processes the 'code' parameter, leading to execution of unauthorized commands or scripts on the server hosting the application. The vulnerability does not require user interaction and can be exploited remotely over the network, with low attack complexity and no privileges required, although some limited privileges may be necessary (PR:L). The CVSS 4.0 vector indicates low impact on confidentiality, integrity, and availability, but the vulnerability still poses a risk of unauthorized code execution. No known exploits are currently reported in the wild, and no patches or mitigations have been published yet. The vulnerability affects a specific file path in the SimStudioAI sim application, which suggests it is part of the API function execution logic, likely a critical component for running simulation or AI-related code snippets. The lack of detailed CWE classification limits precise technical characterization, but the nature of code injection typically allows attackers to execute arbitrary commands, potentially leading to system compromise, data leakage, or service disruption depending on the environment and privileges of the application process.
Potential Impact
For European organizations using SimStudioAI sim version 1.0.0 or earlier, this vulnerability could lead to unauthorized remote code execution on servers running the affected software. This could compromise the confidentiality, integrity, and availability of sensitive simulation data and AI models, which may be critical for research, development, or operational decision-making. Organizations in sectors such as engineering, manufacturing, automotive, aerospace, and academic research that rely on simulation tools could face operational disruptions or intellectual property theft. The medium severity rating suggests that while the impact is not catastrophic, exploitation could still enable attackers to pivot within the network or exfiltrate sensitive information. Given the remote exploitability and lack of user interaction, attackers could automate attacks at scale, increasing risk. The absence of known exploits in the wild currently reduces immediate risk but also means organizations should proactively address the vulnerability before it is weaponized. Additionally, compliance with European data protection regulations (e.g., GDPR) may be impacted if personal or sensitive data processed by the application is exposed or altered.
Mitigation Recommendations
European organizations should immediately inventory their environments to identify any deployments of SimStudioAI sim version 1.0.0 or earlier. Until an official patch is released, organizations should implement strict network-level controls to restrict access to the vulnerable API endpoint, such as IP whitelisting, VPN-only access, or firewall rules limiting inbound traffic. Application-layer protections like Web Application Firewalls (WAFs) should be configured to detect and block suspicious payloads targeting the 'code' parameter. Code review and static analysis of the affected component can help identify unsafe input handling practices, and temporary code-level mitigations such as input validation, sanitization, or disabling the vulnerable functionality may be considered. Monitoring and logging should be enhanced to detect anomalous API requests or unexpected code execution patterns. Organizations should also engage with SimStudioAI for timely patch updates and apply them promptly once available. Finally, conducting penetration testing focused on this vulnerability can help validate the effectiveness of mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-10097: Code Injection in SimStudioAI sim
Description
A vulnerability was identified in SimStudioAI sim up to 1.0.0. This impacts an unknown function of the file apps/sim/app/api/function/execute/route.ts. The manipulation of the argument code leads to code injection. The attack is possible to be carried out remotely.
AI-Powered Analysis
Technical Analysis
CVE-2025-10097 is a medium-severity code injection vulnerability identified in SimStudioAI's 'sim' product, specifically affecting versions up to 1.0.0. The vulnerability resides in an unspecified function within the file apps/sim/app/api/function/execute/route.ts. The root cause is the improper handling of the 'code' argument, which allows an attacker to inject arbitrary code remotely. This means that an attacker can craft malicious input to the vulnerable API endpoint that processes the 'code' parameter, leading to execution of unauthorized commands or scripts on the server hosting the application. The vulnerability does not require user interaction and can be exploited remotely over the network, with low attack complexity and no privileges required, although some limited privileges may be necessary (PR:L). The CVSS 4.0 vector indicates low impact on confidentiality, integrity, and availability, but the vulnerability still poses a risk of unauthorized code execution. No known exploits are currently reported in the wild, and no patches or mitigations have been published yet. The vulnerability affects a specific file path in the SimStudioAI sim application, which suggests it is part of the API function execution logic, likely a critical component for running simulation or AI-related code snippets. The lack of detailed CWE classification limits precise technical characterization, but the nature of code injection typically allows attackers to execute arbitrary commands, potentially leading to system compromise, data leakage, or service disruption depending on the environment and privileges of the application process.
Potential Impact
For European organizations using SimStudioAI sim version 1.0.0 or earlier, this vulnerability could lead to unauthorized remote code execution on servers running the affected software. This could compromise the confidentiality, integrity, and availability of sensitive simulation data and AI models, which may be critical for research, development, or operational decision-making. Organizations in sectors such as engineering, manufacturing, automotive, aerospace, and academic research that rely on simulation tools could face operational disruptions or intellectual property theft. The medium severity rating suggests that while the impact is not catastrophic, exploitation could still enable attackers to pivot within the network or exfiltrate sensitive information. Given the remote exploitability and lack of user interaction, attackers could automate attacks at scale, increasing risk. The absence of known exploits in the wild currently reduces immediate risk but also means organizations should proactively address the vulnerability before it is weaponized. Additionally, compliance with European data protection regulations (e.g., GDPR) may be impacted if personal or sensitive data processed by the application is exposed or altered.
Mitigation Recommendations
European organizations should immediately inventory their environments to identify any deployments of SimStudioAI sim version 1.0.0 or earlier. Until an official patch is released, organizations should implement strict network-level controls to restrict access to the vulnerable API endpoint, such as IP whitelisting, VPN-only access, or firewall rules limiting inbound traffic. Application-layer protections like Web Application Firewalls (WAFs) should be configured to detect and block suspicious payloads targeting the 'code' parameter. Code review and static analysis of the affected component can help identify unsafe input handling practices, and temporary code-level mitigations such as input validation, sanitization, or disabling the vulnerable functionality may be considered. Monitoring and logging should be enhanced to detect anomalous API requests or unexpected code execution patterns. Organizations should also engage with SimStudioAI for timely patch updates and apply them promptly once available. Finally, conducting penetration testing focused on this vulnerability can help validate the effectiveness of mitigations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T09:54:53.415Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf0899d5a2966cfc8193ee
Added to database: 9/8/2025, 4:47:21 PM
Last enriched: 9/16/2025, 1:03:45 AM
Last updated: 10/29/2025, 9:51:01 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.