Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5965: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Centreon Infra Monitoring

0
High
VulnerabilityCVE-2025-5965cvecve-2025-5965cwe-78
Published: Mon Jan 05 2026 (01/05/2026, 10:06:05 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Backup configuration in the administration setup modules) allows OS Command Injection.This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:11:50 UTC

Technical Analysis

CVE-2025-5965 is an OS Command Injection vulnerability classified under CWE-78 found in Centreon Infra Monitoring's backup configuration modules. The vulnerability arises because the software improperly neutralizes special characters or elements in backup parameters, allowing a user with high privileges to append arbitrary OS commands to the backup setup process. This can lead to execution of unintended commands on the underlying operating system with the privileges of the Centreon service or the user executing the backup. Affected versions include 24.04.0 prior to 24.04.19, 24.10.0 prior to 24.10.15, and 25.10.0 prior to 25.10.2. The CVSS v3.1 score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required high privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no exploits are publicly known, the vulnerability poses a significant risk because a compromised backup configuration can lead to arbitrary command execution, potentially allowing attackers to manipulate monitoring data, disrupt monitoring services, or pivot within the network. The vulnerability affects critical monitoring infrastructure, which is often integral to enterprise IT and industrial control environments. The flaw was reserved in June 2025 and published in January 2026, indicating a recent discovery and disclosure. The lack of patch links suggests users must rely on vendor advisories or updates to remediate.

Potential Impact

For European organizations, this vulnerability threatens the integrity and availability of critical infrastructure monitoring systems. Centreon Infra Monitoring is widely used in IT operations, telecommunications, energy, and manufacturing sectors across Europe. Exploitation could allow attackers to execute arbitrary commands, potentially disabling monitoring, falsifying alerts, or gaining further footholds in networks. This could lead to undetected outages, delayed incident response, and broader compromise of enterprise systems. The requirement for high privileges limits exploitation to insiders or attackers who have already escalated privileges, but the impact remains severe due to the critical role of monitoring systems. Disruption in sectors such as energy grids, transportation, and healthcare could have cascading effects on public safety and economic stability. Additionally, the ability to manipulate backup configurations may facilitate persistence and stealthy attacks, complicating forensic investigations and recovery efforts.

Mitigation Recommendations

Organizations should immediately identify all Centreon Infra Monitoring instances and verify their versions. They must upgrade affected versions to the latest patched releases: 24.04.19 or later, 24.10.15 or later, and 25.10.2 or later as provided by Centreon. Until patches are applied, restrict access to backup configuration modules strictly to trusted administrators and implement strong privilege management to minimize the number of users with high privileges. Conduct thorough audits of backup configurations to detect any unauthorized or suspicious command injections. Employ application-layer firewalls or intrusion detection systems to monitor and block anomalous command execution patterns related to Centreon processes. Regularly review logs for unusual activity around backup operations. Additionally, consider isolating monitoring infrastructure from general user networks to reduce attack surface. Engage with Centreon support for any available hotfixes or workarounds and monitor for updates or exploit reports.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Centreon
Date Reserved
2025-06-10T08:14:47.529Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695b8f06db813ff03e463837

Added to database: 1/5/2026, 10:14:30 AM

Last enriched: 1/12/2026, 9:11:50 PM

Last updated: 2/7/2026, 6:34:30 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats