Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15500: OS Command Injection in Sangfor Operation and Maintenance Management System

0
Critical
VulnerabilityCVE-2025-15500cvecve-2025-15500
Published: Fri Jan 09 2026 (01/09/2026, 21:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Sangfor
Product: Operation and Maintenance Management System

Description

A vulnerability was found in Sangfor Operation and Maintenance Management System up to 3.0.8. This issue affects some unknown processing of the file /isomp-protocol/protocol/getHis of the component HTTP POST Request Handler. The manipulation of the argument sessionPath results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/09/2026, 21:54:52 UTC

Technical Analysis

CVE-2025-15500 is an OS command injection vulnerability found in Sangfor's Operation and Maintenance Management System (OMMS) versions 3.0.0 through 3.0.8. The flaw exists in the HTTP POST request handler for the endpoint /isomp-protocol/protocol/getHis, specifically in the processing of the sessionPath parameter. An attacker can manipulate this parameter to inject arbitrary operating system commands, which the server executes with the privileges of the OMMS service. This vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) reflects that the attack is network-based, requires low attack complexity, no privileges or user interaction, and results in high confidentiality, integrity, and availability impacts. The vendor has not issued any patches or advisories, and public exploit code is available, increasing the risk of active exploitation. The vulnerability could allow attackers to fully compromise affected systems, execute arbitrary commands, steal sensitive data, disrupt operations, or pivot within networks. Given the critical nature of OMMS in managing IT infrastructure, exploitation could have severe operational consequences.

Potential Impact

For European organizations, this vulnerability poses a severe threat to operational security and data confidentiality. Sangfor OMMS is used in network and infrastructure management, so exploitation could lead to complete system compromise, allowing attackers to disrupt critical services, exfiltrate sensitive information, or deploy ransomware. The lack of vendor response and patches increases exposure time. Organizations in sectors such as telecommunications, finance, government, and critical infrastructure that rely on Sangfor products are at heightened risk. The ability to execute OS commands remotely without authentication means attackers can quickly gain control, potentially affecting availability of essential services and causing cascading failures. This could result in financial losses, regulatory penalties under GDPR for data breaches, and damage to organizational reputation.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls: restrict access to the OMMS management interface to trusted IPs only, ideally via VPN or isolated management networks. Implement strict input validation and filtering on the sessionPath parameter if possible through web application firewalls (WAFs) or reverse proxies. Monitor logs and network traffic for unusual POST requests to /isomp-protocol/protocol/getHis, especially those containing suspicious command injection patterns. Disable or isolate vulnerable OMMS instances until a vendor patch is available. Conduct thorough audits of affected systems for signs of compromise. Engage with Sangfor support channels to demand timely patch releases. Consider deploying endpoint detection and response (EDR) solutions to detect post-exploitation activities. Finally, maintain up-to-date backups and incident response plans tailored to potential ransomware or data breach scenarios stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T17:12:03.266Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696175d145ea0302aa963f37

Added to database: 1/9/2026, 9:40:33 PM

Last enriched: 1/9/2026, 9:54:52 PM

Last updated: 1/10/2026, 8:30:38 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats