Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34099: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in VICIdial Group VICIdial

0
Critical
VulnerabilityCVE-2025-34099cvecve-2025-34099cwe-78cwe-20
Published: Thu Jul 10 2025 (07/10/2025, 19:10:18 UTC)
Source: CVE Database V5
Vendor/Project: VICIdial Group
Product: VICIdial

Description

An unauthenticated command injection vulnerability exists in VICIdial versions 2.9 RC1 through 2.13 RC1, within the vicidial_sales_viewer.php component when password encryption is enabled (a non-default configuration). The application improperly passes the HTTP Basic Authentication password directly to a call to exec() without adequate sanitation. This allows remote attackers to inject and execute arbitrary operating system commands as the web server user. NOTE: This vulnerability was mitigated in 2017.

AI-Powered Analysis

AILast updated: 11/19/2025, 13:14:50 UTC

Technical Analysis

CVE-2025-34099 is an OS command injection vulnerability classified under CWE-78 and CWE-20 that affects VICIdial Group's VICIdial software versions 2.9 RC1 through 2.13 RC1. The vulnerability exists in the vicidial_sales_viewer.php script when password encryption is enabled—a non-default configuration. The root cause is the insecure handling of the HTTP Basic Authentication password, which is passed directly to the PHP exec() function without proper input validation or sanitization. This allows an unauthenticated remote attacker to inject arbitrary shell commands, which the web server executes with its privileges. Since the vulnerability requires no authentication or user interaction, exploitation is straightforward, increasing the risk. The exec() function is inherently dangerous when handling user input, and the lack of sanitization violates secure coding practices. Although the vulnerability was mitigated in 2017, legacy systems that have not applied patches remain vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the critical nature of the flaw demands immediate attention.

Potential Impact

For European organizations, especially those operating call centers or customer support platforms using VICIdial, this vulnerability poses a severe risk. Exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, potentially leading to data exfiltration, service disruption, or pivoting within the network. Confidential customer data, call logs, and sensitive operational information could be exposed or manipulated. The availability of the VICIdial system could be compromised, impacting business continuity and customer service operations. Given the unauthenticated nature of the exploit, attackers can launch attacks remotely without prior access, increasing the threat landscape. The impact is heightened in regulated industries such as finance, healthcare, and telecommunications, where data protection and service availability are critical. Additionally, the vulnerability could be leveraged for ransomware deployment or lateral movement within corporate networks.

Mitigation Recommendations

1. Immediately upgrade VICIdial installations to versions later than 2.13 RC1 where this vulnerability has been mitigated. 2. If upgrading is not immediately possible, disable password encryption in the vicidial_sales_viewer.php component to avoid the vulnerable code path. 3. Implement strict input validation and sanitization on all user-supplied inputs, especially those passed to system-level commands. 4. Restrict web server user privileges to the minimum necessary to limit the impact of potential command execution. 5. Monitor network traffic and logs for unusual or suspicious activity related to the vicidial_sales_viewer.php endpoint. 6. Employ web application firewalls (WAFs) with custom rules to detect and block command injection attempts targeting this component. 7. Conduct regular vulnerability scans and penetration tests focusing on legacy VICIdial deployments. 8. Educate IT staff about the risks of enabling non-default configurations like password encryption without proper security review. 9. Maintain an incident response plan to quickly address potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687014fca83201eaaca979db

Added to database: 7/10/2025, 7:31:08 PM

Last enriched: 11/19/2025, 1:14:50 PM

Last updated: 11/22/2025, 4:23:14 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats