CVE-2025-34099: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in VICIdial Group VICIdial
An unauthenticated command injection vulnerability exists in VICIdial versions 2.9 RC1 through 2.13 RC1, within the vicidial_sales_viewer.php component when password encryption is enabled (a non-default configuration). The application improperly passes the HTTP Basic Authentication password directly to a call to exec() without adequate sanitation. This allows remote attackers to inject and execute arbitrary operating system commands as the web server user. NOTE: This vulnerability was mitigated in 2017.
AI Analysis
Technical Summary
CVE-2025-34099 is an OS command injection vulnerability classified under CWE-78 and CWE-20, affecting VICIdial versions 2.9 RC1 through 2.13 RC1. The vulnerability exists in the vicidial_sales_viewer.php component when password encryption is enabled, a non-default configuration. The core issue is that the HTTP Basic Authentication password is passed directly to the PHP exec() function without adequate sanitization or validation, enabling an unauthenticated remote attacker to inject arbitrary operating system commands. This leads to command execution with the privileges of the web server user, potentially allowing full system compromise, data exfiltration, or service disruption. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. Although the vulnerability was mitigated in 2017, systems that have not applied the fix remain vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, but the critical nature and ease of exploitation make this a high-risk issue for affected environments.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for those operating call centers or customer service platforms using VICIdial. Successful exploitation can lead to complete system compromise, unauthorized data access, and disruption of telephony services. Confidential customer data and call records could be exposed or manipulated, violating GDPR and other data protection regulations, leading to legal and financial penalties. The availability of call center services could be disrupted, impacting business operations and customer satisfaction. The ease of exploitation without authentication increases the risk of widespread attacks, including ransomware or lateral movement within corporate networks. Organizations relying on legacy VICIdial versions without mitigation are particularly vulnerable. The reputational damage and operational downtime could be severe, especially for sectors like finance, healthcare, and government services that depend on secure and reliable communication systems.
Mitigation Recommendations
1. Immediately upgrade VICIdial installations to versions released after 2017 that include the mitigation for this vulnerability. 2. If upgrading is not immediately possible, disable password encryption in VICIdial configurations to avoid triggering the vulnerable code path. 3. Implement strict input validation and sanitization on all user inputs, especially those involved in authentication processes. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious command injection patterns targeting vicidial_sales_viewer.php. 5. Restrict network access to VICIdial web interfaces to trusted IP ranges and enforce strong network segmentation. 6. Monitor logs for unusual command execution or authentication attempts that could indicate exploitation attempts. 7. Conduct regular security audits and penetration tests focusing on telephony and call center infrastructure. 8. Educate IT and security teams about the risks of legacy telephony software and the importance of timely patching.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain
CVE-2025-34099: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in VICIdial Group VICIdial
Description
An unauthenticated command injection vulnerability exists in VICIdial versions 2.9 RC1 through 2.13 RC1, within the vicidial_sales_viewer.php component when password encryption is enabled (a non-default configuration). The application improperly passes the HTTP Basic Authentication password directly to a call to exec() without adequate sanitation. This allows remote attackers to inject and execute arbitrary operating system commands as the web server user. NOTE: This vulnerability was mitigated in 2017.
AI-Powered Analysis
Technical Analysis
CVE-2025-34099 is an OS command injection vulnerability classified under CWE-78 and CWE-20, affecting VICIdial versions 2.9 RC1 through 2.13 RC1. The vulnerability exists in the vicidial_sales_viewer.php component when password encryption is enabled, a non-default configuration. The core issue is that the HTTP Basic Authentication password is passed directly to the PHP exec() function without adequate sanitization or validation, enabling an unauthenticated remote attacker to inject arbitrary operating system commands. This leads to command execution with the privileges of the web server user, potentially allowing full system compromise, data exfiltration, or service disruption. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. Although the vulnerability was mitigated in 2017, systems that have not applied the fix remain vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are currently in the wild, but the critical nature and ease of exploitation make this a high-risk issue for affected environments.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for those operating call centers or customer service platforms using VICIdial. Successful exploitation can lead to complete system compromise, unauthorized data access, and disruption of telephony services. Confidential customer data and call records could be exposed or manipulated, violating GDPR and other data protection regulations, leading to legal and financial penalties. The availability of call center services could be disrupted, impacting business operations and customer satisfaction. The ease of exploitation without authentication increases the risk of widespread attacks, including ransomware or lateral movement within corporate networks. Organizations relying on legacy VICIdial versions without mitigation are particularly vulnerable. The reputational damage and operational downtime could be severe, especially for sectors like finance, healthcare, and government services that depend on secure and reliable communication systems.
Mitigation Recommendations
1. Immediately upgrade VICIdial installations to versions released after 2017 that include the mitigation for this vulnerability. 2. If upgrading is not immediately possible, disable password encryption in VICIdial configurations to avoid triggering the vulnerable code path. 3. Implement strict input validation and sanitization on all user inputs, especially those involved in authentication processes. 4. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious command injection patterns targeting vicidial_sales_viewer.php. 5. Restrict network access to VICIdial web interfaces to trusted IP ranges and enforce strong network segmentation. 6. Monitor logs for unusual command execution or authentication attempts that could indicate exploitation attempts. 7. Conduct regular security audits and penetration tests focusing on telephony and call center infrastructure. 8. Educate IT and security teams about the risks of legacy telephony software and the importance of timely patching.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.555Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687014fca83201eaaca979db
Added to database: 7/10/2025, 7:31:08 PM
Last enriched: 11/26/2025, 2:10:10 PM
Last updated: 1/7/2026, 4:20:58 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.