Skip to main content

CVE-2025-34099: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in VICIdial Group VICIdial

Critical
VulnerabilityCVE-2025-34099cvecve-2025-34099cwe-78cwe-20
Published: Thu Jul 10 2025 (07/10/2025, 19:10:18 UTC)
Source: CVE Database V5
Vendor/Project: VICIdial Group
Product: VICIdial

Description

An unauthenticated command injection vulnerability exists in VICIdial versions 2.9 RC1 through 2.13 RC1, within the vicidial_sales_viewer.php component when password encryption is enabled (a non-default configuration). The application improperly passes the HTTP Basic Authentication password directly to a call to exec() without adequate sanitation. This allows remote attackers to inject and execute arbitrary operating system commands as the web server user. NOTE: This vulnerability was mitigated in 2017.

AI-Powered Analysis

AILast updated: 08/08/2025, 00:39:54 UTC

Technical Analysis

CVE-2025-34099 is a critical unauthenticated OS command injection vulnerability affecting VICIdial versions 2.9 RC1 through 2.13 RC1, specifically within the vicidial_sales_viewer.php component when password encryption is enabled—a non-default configuration. The vulnerability arises because the application improperly passes the HTTP Basic Authentication password directly to the exec() function without proper sanitization. This flaw allows remote attackers to inject arbitrary operating system commands that execute with the privileges of the web server user, potentially leading to full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) and CWE-20 (Improper Input Validation). The CVSS 4.0 base score is 9.3, reflecting its critical severity, with an attack vector of network (no authentication or user interaction required), and high impact on confidentiality, integrity, and availability. Although this vulnerability was mitigated in 2017, the published date of 2025 suggests either a re-discovery or a new variant affecting older versions still in use. No known exploits are currently reported in the wild, but the ease of exploitation and severity make it a significant threat to organizations running vulnerable VICIdial versions with password encryption enabled.

Potential Impact

For European organizations using VICIdial versions 2.9 RC1 through 2.13 RC1 with password encryption enabled, this vulnerability poses a severe risk. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to compromise call center infrastructure, intercept or manipulate sensitive customer data, disrupt telephony services, or pivot to other internal systems. This can result in data breaches, service outages, reputational damage, and regulatory non-compliance under GDPR due to exposure of personal data. The critical nature of the vulnerability means that even organizations with strong perimeter defenses are at risk if the vulnerable VICIdial instance is exposed to the internet or accessible from internal networks. The lack of authentication and user interaction requirements further increases the threat surface. Given the role of VICIdial in telephony and customer relationship management, disruption or compromise could have direct operational and financial impacts.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should upgrade VICIdial to a version released after the 2017 mitigation or apply any available security patches that address this vulnerability. If no official patch exists for the affected versions, consider disabling password encryption or reverting to default configurations until an upgrade is possible. 2. Input validation and sanitization: Review and harden any custom code or configurations that handle authentication credentials to ensure no direct execution of unsanitized inputs occurs. 3. Network segmentation: Restrict access to VICIdial web interfaces to trusted internal networks or VPNs to reduce exposure to remote attackers. 4. Web application firewall (WAF): Deploy and configure WAF rules to detect and block command injection patterns targeting vicidial_sales_viewer.php or related endpoints. 5. Monitoring and logging: Enable detailed logging of web server and application activity to detect suspicious command execution attempts. 6. Incident response readiness: Prepare to isolate affected systems and conduct forensic analysis if exploitation is suspected. 7. Disable or limit HTTP Basic Authentication usage if possible, or replace it with more secure authentication mechanisms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687014fca83201eaaca979db

Added to database: 7/10/2025, 7:31:08 PM

Last enriched: 8/8/2025, 12:39:54 AM

Last updated: 8/14/2025, 12:33:59 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats