CVE-2025-57799: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemon8866 StreamVault
StreamVault is a multi-platform video parsing and downloading tool. Prior to version 250822, after logging into the StreamVault-system, an attacker can modify certain system parameters, construct malicious commands, execute command injection attacks against the system, and ultimately gain server privileges. Users of all versions of the StreamVault system to date who have not modified their background passwords or use weak passwords are at risk of having their systems taken over via remote command execution. This issue has been patched in version 250822.
AI Analysis
Technical Summary
CVE-2025-57799 is a high-severity OS command injection vulnerability (CWE-78) affecting lemon8866's StreamVault, a multi-platform video parsing and downloading tool. The vulnerability exists in versions prior to 250822. After authenticating to the StreamVault system, an attacker with at least limited privileges can modify certain system parameters that are improperly sanitized, allowing them to inject and execute arbitrary operating system commands. This leads to remote command execution on the server hosting StreamVault, potentially resulting in full server compromise and privilege escalation. The vulnerability does not require user interaction beyond logging in, and no additional authentication bypass is needed beyond valid credentials. The CVSS 4.0 score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges required beyond login, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability has been patched in version 250822. However, systems running older versions with default or weak passwords remain at risk. No known exploits are currently reported in the wild, but the ease of exploitation and impact make this a critical concern for affected users.
Potential Impact
For European organizations using StreamVault, this vulnerability poses a significant risk. Successful exploitation can lead to full server compromise, allowing attackers to access sensitive video data, manipulate or delete content, disrupt services, or use the compromised server as a foothold for lateral movement within the network. Given StreamVault's role in video parsing and downloading, organizations in media, surveillance, broadcasting, or content delivery sectors are particularly vulnerable. The compromise of video data can lead to confidentiality breaches, intellectual property theft, and reputational damage. Additionally, attackers gaining server privileges could disrupt critical operations or launch further attacks. The risk is heightened if organizations have not updated to the patched version or maintain weak authentication practices. The lack of required user interaction and network accessibility of the service increases the likelihood of remote exploitation.
Mitigation Recommendations
European organizations should immediately verify their StreamVault version and upgrade to version 250822 or later to apply the official patch. Until patched, restrict access to the StreamVault management interface via network segmentation and firewall rules to trusted administrators only. Enforce strong, unique passwords and consider implementing multi-factor authentication if supported. Monitor logs for unusual parameter changes or command execution attempts. Employ application-layer firewalls or intrusion detection systems capable of detecting command injection patterns. Regularly audit and harden server configurations hosting StreamVault to minimize attack surface. Additionally, conduct internal penetration testing to verify the absence of exploitation and ensure that no unauthorized commands have been executed. Maintain an incident response plan tailored to potential server compromises involving StreamVault.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-57799: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemon8866 StreamVault
Description
StreamVault is a multi-platform video parsing and downloading tool. Prior to version 250822, after logging into the StreamVault-system, an attacker can modify certain system parameters, construct malicious commands, execute command injection attacks against the system, and ultimately gain server privileges. Users of all versions of the StreamVault system to date who have not modified their background passwords or use weak passwords are at risk of having their systems taken over via remote command execution. This issue has been patched in version 250822.
AI-Powered Analysis
Technical Analysis
CVE-2025-57799 is a high-severity OS command injection vulnerability (CWE-78) affecting lemon8866's StreamVault, a multi-platform video parsing and downloading tool. The vulnerability exists in versions prior to 250822. After authenticating to the StreamVault system, an attacker with at least limited privileges can modify certain system parameters that are improperly sanitized, allowing them to inject and execute arbitrary operating system commands. This leads to remote command execution on the server hosting StreamVault, potentially resulting in full server compromise and privilege escalation. The vulnerability does not require user interaction beyond logging in, and no additional authentication bypass is needed beyond valid credentials. The CVSS 4.0 score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges required beyond login, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability has been patched in version 250822. However, systems running older versions with default or weak passwords remain at risk. No known exploits are currently reported in the wild, but the ease of exploitation and impact make this a critical concern for affected users.
Potential Impact
For European organizations using StreamVault, this vulnerability poses a significant risk. Successful exploitation can lead to full server compromise, allowing attackers to access sensitive video data, manipulate or delete content, disrupt services, or use the compromised server as a foothold for lateral movement within the network. Given StreamVault's role in video parsing and downloading, organizations in media, surveillance, broadcasting, or content delivery sectors are particularly vulnerable. The compromise of video data can lead to confidentiality breaches, intellectual property theft, and reputational damage. Additionally, attackers gaining server privileges could disrupt critical operations or launch further attacks. The risk is heightened if organizations have not updated to the patched version or maintain weak authentication practices. The lack of required user interaction and network accessibility of the service increases the likelihood of remote exploitation.
Mitigation Recommendations
European organizations should immediately verify their StreamVault version and upgrade to version 250822 or later to apply the official patch. Until patched, restrict access to the StreamVault management interface via network segmentation and firewall rules to trusted administrators only. Enforce strong, unique passwords and consider implementing multi-factor authentication if supported. Monitor logs for unusual parameter changes or command execution attempts. Employ application-layer firewalls or intrusion detection systems capable of detecting command injection patterns. Regularly audit and harden server configurations hosting StreamVault to minimize attack surface. Additionally, conduct internal penetration testing to verify the absence of exploitation and ensure that no unauthorized commands have been executed. Maintain an incident response plan tailored to potential server compromises involving StreamVault.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-20T14:30:35.009Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b5c3a1ad5a09ad00d0bec1
Added to database: 9/1/2025, 4:02:41 PM
Last enriched: 9/1/2025, 4:17:43 PM
Last updated: 9/3/2025, 5:29:54 PM
Views: 13
Related Threats
CVE-2025-9930: SQL Injection in 1000projects Beauty Parlour Management System
MediumCVE-2025-9929: Cross Site Scripting in code-projects Responsive Blog Site
MediumHackers use new HexStrike-AI tool to rapidly exploit n-day flaws
HighCVE-2025-9928: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9927: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.