Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5965: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Centreon Infra Monitoring

0
High
VulnerabilityCVE-2025-5965cvecve-2025-5965cwe-78
Published: Mon Jan 05 2026 (01/05/2026, 10:06:05 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Backup configuration in the administration setup modules) allows OS Command Injection.This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.

AI-Powered Analysis

AILast updated: 01/05/2026, 10:28:50 UTC

Technical Analysis

CVE-2025-5965 is an OS Command Injection vulnerability categorized under CWE-78 found in Centreon Infra Monitoring's backup configuration module. The flaw exists because the software fails to properly sanitize or neutralize special characters or command elements in the backup parameters, which are configurable by users with high privileges. This allows such users to append arbitrary OS commands to the backup setup instructions, which the system then executes with the privileges of the Centreon Infra Monitoring process. A successful exploit can lead to execution of arbitrary commands on the underlying operating system, potentially resulting in full system compromise including unauthorized data access, modification, or destruction, and disruption of monitoring services. The vulnerability affects multiple versions: 25.10.0 before 25.10.2, 24.10.0 before 24.10.15, and 24.04.0 before 24.04.19. The CVSS v3.1 base score is 7.2, indicating high severity, with attack vector being network-based, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits have been reported, the presence of this vulnerability in critical monitoring infrastructure software makes it a significant risk. Centreon Infra Monitoring is widely used in enterprise and industrial environments for infrastructure health and performance monitoring, making this vulnerability particularly impactful if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-5965 can be severe. Centreon Infra Monitoring is often deployed in critical infrastructure sectors such as energy, telecommunications, finance, and manufacturing across Europe. Exploitation could allow attackers with administrative access to execute arbitrary commands, potentially leading to data breaches, sabotage of monitoring systems, and disruption of operational technology environments. This can result in loss of sensitive data, interruption of business operations, and damage to organizational reputation. Given the role of monitoring tools in maintaining system health and security, compromise could also delay detection of other attacks or failures, amplifying the overall risk. Organizations relying on Centreon for compliance reporting or operational continuity may face regulatory and financial consequences if this vulnerability is exploited. The requirement for high privileges limits the attack surface to insiders or attackers who have already escalated privileges, but the potential damage remains critical.

Mitigation Recommendations

To mitigate CVE-2025-5965, European organizations should: 1) Immediately apply the vendor-provided patches or updates that fix this vulnerability (upgrade to Centreon Infra Monitoring versions 25.10.2, 24.10.15, or 24.04.19 or later). 2) Restrict administrative access to the backup configuration module strictly to trusted and verified personnel, employing strong authentication and role-based access controls. 3) Implement monitoring and alerting for unusual command execution or configuration changes within Centreon Infra Monitoring. 4) Conduct regular audits of backup configuration settings to detect unauthorized modifications. 5) Use network segmentation to isolate monitoring infrastructure from less trusted networks to reduce exposure. 6) Employ application whitelisting and endpoint protection to detect or block unauthorized command execution. 7) Educate administrators about the risks of command injection and the importance of secure configuration management. 8) Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block injection attempts if applicable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Centreon
Date Reserved
2025-06-10T08:14:47.529Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695b8f06db813ff03e463837

Added to database: 1/5/2026, 10:14:30 AM

Last enriched: 1/5/2026, 10:28:50 AM

Last updated: 1/7/2026, 4:46:48 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats