Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34099: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in VICIdial Group VICIdial

0
Critical
VulnerabilityCVE-2025-34099cvecve-2025-34099cwe-78cwe-20
Published: Thu Jul 10 2025 (07/10/2025, 19:10:18 UTC)
Source: CVE Database V5
Vendor/Project: VICIdial Group
Product: VICIdial

Description

An unauthenticated command injection vulnerability exists in VICIdial versions 2.9 RC1 through 2.13 RC1, within the vicidial_sales_viewer.php component when password encryption is enabled (a non-default configuration). The application improperly passes the HTTP Basic Authentication password directly to a call to exec() without adequate sanitation. This allows remote attackers to inject and execute arbitrary operating system commands as the web server user. NOTE: This vulnerability was mitigated in 2017.

AI-Powered Analysis

AILast updated: 11/26/2025, 14:10:10 UTC

Technical Analysis

CVE-2025-34099 is an OS command injection vulnerability classified under CWE-78 and CWE-20, affecting VICIdial versions 2.9 RC1 through 2.13 RC1. The vulnerability exists in the vicidial_sales_viewer.php component when password encryption is enabled, a non-default configuration. The core issue is that the HTTP Basic Authentication password is passed directly to the PHP exec() function without adequate sanitization or validation, enabling an unauthenticated remote attacker to inject arbitrary operating system commands. This leads to command execution with the privileges of the web server user, potentially allowing full system compromise, data exfiltration, or service disruption. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. Although the vulnerability was mitigated in 2017, systems that have not applied the fix remain vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, but the critical nature and ease of exploitation make this a high-risk issue for affected environments.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those operating call centers or customer service platforms using VICIdial. Successful exploitation can lead to complete system compromise, unauthorized data access, and disruption of telephony services. Confidential customer data and call records could be exposed or manipulated, violating GDPR and other data protection regulations, leading to legal and financial penalties. The availability of call center services could be disrupted, impacting business operations and customer satisfaction. The ease of exploitation without authentication increases the risk of widespread attacks, including ransomware or lateral movement within corporate networks. Organizations relying on legacy VICIdial versions without mitigation are particularly vulnerable. The reputational damage and operational downtime could be severe, especially for sectors like finance, healthcare, and government services that depend on secure and reliable communication systems.

Mitigation Recommendations

1. Immediately upgrade VICIdial installations to versions released after 2017 that include the mitigation for this vulnerability. 2. If upgrading is not immediately possible, disable password encryption in VICIdial configurations to avoid triggering the vulnerable code path. 3. Implement strict input validation and sanitization on all user inputs, especially those involved in authentication processes. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious command injection patterns targeting vicidial_sales_viewer.php. 5. Restrict network access to VICIdial web interfaces to trusted IP ranges and enforce strong network segmentation. 6. Monitor logs for unusual command execution or authentication attempts that could indicate exploitation attempts. 7. Conduct regular security audits and penetration tests focusing on telephony and call center infrastructure. 8. Educate IT and security teams about the risks of legacy telephony software and the importance of timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687014fca83201eaaca979db

Added to database: 7/10/2025, 7:31:08 PM

Last enriched: 11/26/2025, 2:10:10 PM

Last updated: 1/7/2026, 4:20:58 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats