Skip to main content

CVE-2025-48140: CWE-94 Improper Control of Generation of Code ('Code Injection') in metalpriceapi MetalpriceAPI

Critical
VulnerabilityCVE-2025-48140cvecve-2025-48140cwe-94
Published: Mon Jun 09 2025 (06/09/2025, 15:53:59 UTC)
Source: CVE Database V5
Vendor/Project: metalpriceapi
Product: MetalpriceAPI

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in metalpriceapi MetalpriceAPI allows Code Injection. This issue affects MetalpriceAPI: from n/a through 1.1.4.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:02:02 UTC

Technical Analysis

CVE-2025-48140 is a critical security vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects MetalpriceAPI, a software product designed to provide metal price data through an API interface. The flaw exists in versions up to 1.1.4, allowing an attacker with at least low privileges (PR:L) and no user interaction (UI:N) to remotely execute arbitrary code on the affected system. The vulnerability has a CVSS v3.1 base score of 9.9, indicating a critical severity level. The attack vector is network-based (AV:N), meaning exploitation can occur remotely without physical access. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), and the scope is changed (S:C), implying that exploitation can affect resources beyond the initially vulnerable component. Although no known exploits are reported in the wild yet, the nature of the vulnerability—code injection—makes it highly exploitable and dangerous. The absence of patches or mitigations at the time of publication increases the urgency for affected organizations to implement compensating controls. The vulnerability likely arises from insufficient validation or sanitization of input that is used to generate or execute code dynamically within MetalpriceAPI, enabling attackers to inject malicious code that the system executes with the privileges of the API service. This could lead to full system compromise, data theft, manipulation of metal price data, or disruption of services relying on this API.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those in sectors relying on accurate and timely metal price data such as manufacturing, commodities trading, financial services, and supply chain management. Exploitation could lead to unauthorized access to sensitive pricing data, manipulation of metal price feeds, or disruption of automated trading systems, potentially causing financial losses and reputational damage. Additionally, if MetalpriceAPI is integrated into broader enterprise systems, attackers could pivot from the API to internal networks, escalating privileges and compromising critical infrastructure. The critical nature of the vulnerability means that attackers could achieve complete control over affected systems remotely, without user interaction, increasing the risk of widespread attacks. Given the strategic importance of metals in European industries and the reliance on digital services, this vulnerability poses a significant threat to business continuity and data integrity.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement the following mitigations: 1) Restrict network access to MetalpriceAPI instances using firewalls and network segmentation to limit exposure to trusted IP addresses only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious input patterns indicative of code injection attempts. 3) Conduct thorough input validation and sanitization on all data entering the API, applying strict whitelisting where possible. 4) Monitor logs and network traffic for unusual activity or signs of exploitation attempts. 5) Run MetalpriceAPI with the least privileges necessary to limit the impact of a potential compromise. 6) Prepare for rapid patch deployment by establishing communication channels with the vendor or monitoring for updates. 7) Consider deploying runtime application self-protection (RASP) tools that can detect and block code injection attacks in real-time. 8) Perform regular security assessments and penetration testing focused on injection vulnerabilities in the API environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:40.432Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a8e4

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 2:02:02 AM

Last updated: 8/7/2025, 10:23:15 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats