Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30044: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS CommandInjection') in CGM CGM CLININET

0
Critical
VulnerabilityCVE-2025-30044cvecve-2025-30044cwe-78
Published: Mon Mar 02 2026 (03/02/2026, 11:15:43 UTC)
Source: CVE Database V5
Vendor/Project: CGM
Product: CGM CLININET

Description

In the endpoints "/cgi-bin/CliniNET.prd/utils/usrlogstat_simple.pl", "/cgi-bin/CliniNET.prd/utils/usrlogstat.pl", "/cgi-bin/CliniNET.prd/utils/userlogstat2.pl", and "/cgi-bin/CliniNET.prd/utils/dblogstat.pl", the parameters are not sufficiently normalized, which enables code injection.

AI-Powered Analysis

AILast updated: 03/02/2026, 11:40:46 UTC

Technical Analysis

CVE-2025-30044 is an OS command injection vulnerability classified under CWE-78, affecting the CGM CLININET product. The vulnerability exists in multiple CGI scripts located at /cgi-bin/CliniNET.prd/utils/, specifically usrlogstat_simple.pl, usrlogstat.pl, userlogstat2.pl, and dblogstat.pl. These endpoints fail to properly normalize or sanitize user-supplied parameters, allowing attackers to inject malicious OS commands. Because these scripts are accessible remotely and do not require authentication or user interaction, an attacker can exploit this flaw over the network to execute arbitrary commands with the privileges of the web server process. The CVSS 4.0 vector indicates attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, availability, and scope. This means the vulnerability can be exploited remotely with relative ease and can lead to full system compromise, data theft, or service disruption. The vulnerability was reserved in March 2025 and published in March 2026, with no patches currently listed, and no known exploits reported in the wild. The affected product, CGM CLININET, is a clinical information system used primarily in healthcare settings, making the impact potentially severe for patient data and healthcare operations.

Potential Impact

The impact of CVE-2025-30044 is critical for organizations using CGM CLININET, especially healthcare providers managing sensitive patient information. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to gain control over affected systems. This can result in data breaches exposing confidential patient records, disruption of healthcare services through denial of service or system manipulation, and potential lateral movement within the network to compromise additional assets. The integrity of clinical data can be compromised, undermining patient safety and trust. Availability of critical healthcare applications may be affected, potentially delaying medical treatments. Given the critical nature of healthcare infrastructure and the sensitivity of data involved, the threat poses a significant risk to organizational operations, regulatory compliance, and patient privacy worldwide.

Mitigation Recommendations

To mitigate CVE-2025-30044, organizations should implement the following specific measures: 1) Immediately restrict network access to the vulnerable CGI endpoints using firewall rules or web application firewalls (WAF) to limit exposure to trusted internal networks only. 2) Implement strict input validation and sanitization on all parameters accepted by the affected scripts to neutralize special characters and prevent command injection. 3) If possible, disable or remove the vulnerable CGI scripts until a vendor patch is available. 4) Monitor web server logs and network traffic for unusual command execution patterns or suspicious requests targeting the affected endpoints. 5) Employ application-layer security controls such as runtime application self-protection (RASP) to detect and block injection attempts. 6) Engage with the vendor CGM for timely updates or patches and apply them as soon as they become available. 7) Conduct security assessments and penetration testing focused on CGI scripts and command injection vectors within the environment. 8) Ensure least privilege principles are applied to the web server process to limit potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-03-14T14:54:23.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a573fd32ffcdb8a20705e2

Added to database: 3/2/2026, 11:26:53 AM

Last enriched: 3/2/2026, 11:40:46 AM

Last updated: 3/2/2026, 10:21:09 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses