CVE-2025-5965: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Centreon Infra Monitoring
In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Backup configuration in the administration setup modules) allows OS Command Injection.This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.
AI Analysis
Technical Summary
CVE-2025-5965 is an OS Command Injection vulnerability classified under CWE-78 found in Centreon Infra Monitoring's backup configuration modules. The vulnerability arises because the software improperly neutralizes special characters or elements in backup parameters, allowing a user with high privileges to append arbitrary OS commands to the backup setup process. This can lead to execution of unintended commands on the underlying operating system with the privileges of the Centreon service or the user executing the backup. Affected versions include 24.04.0 prior to 24.04.19, 24.10.0 prior to 24.10.15, and 25.10.0 prior to 25.10.2. The CVSS v3.1 score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required high privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no exploits are publicly known, the vulnerability poses a significant risk because a compromised backup configuration can lead to arbitrary command execution, potentially allowing attackers to manipulate monitoring data, disrupt monitoring services, or pivot within the network. The vulnerability affects critical monitoring infrastructure, which is often integral to enterprise IT and industrial control environments. The flaw was reserved in June 2025 and published in January 2026, indicating a recent discovery and disclosure. The lack of patch links suggests users must rely on vendor advisories or updates to remediate.
Potential Impact
For European organizations, this vulnerability threatens the integrity and availability of critical infrastructure monitoring systems. Centreon Infra Monitoring is widely used in IT operations, telecommunications, energy, and manufacturing sectors across Europe. Exploitation could allow attackers to execute arbitrary commands, potentially disabling monitoring, falsifying alerts, or gaining further footholds in networks. This could lead to undetected outages, delayed incident response, and broader compromise of enterprise systems. The requirement for high privileges limits exploitation to insiders or attackers who have already escalated privileges, but the impact remains severe due to the critical role of monitoring systems. Disruption in sectors such as energy grids, transportation, and healthcare could have cascading effects on public safety and economic stability. Additionally, the ability to manipulate backup configurations may facilitate persistence and stealthy attacks, complicating forensic investigations and recovery efforts.
Mitigation Recommendations
Organizations should immediately identify all Centreon Infra Monitoring instances and verify their versions. They must upgrade affected versions to the latest patched releases: 24.04.19 or later, 24.10.15 or later, and 25.10.2 or later as provided by Centreon. Until patches are applied, restrict access to backup configuration modules strictly to trusted administrators and implement strong privilege management to minimize the number of users with high privileges. Conduct thorough audits of backup configurations to detect any unauthorized or suspicious command injections. Employ application-layer firewalls or intrusion detection systems to monitor and block anomalous command execution patterns related to Centreon processes. Regularly review logs for unusual activity around backup operations. Additionally, consider isolating monitoring infrastructure from general user networks to reduce attack surface. Engage with Centreon support for any available hotfixes or workarounds and monitor for updates or exploit reports.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-5965: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Centreon Infra Monitoring
Description
In the backup parameters, a user with high privilege is able to concatenate custom instructions to the backup setup. Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Backup configuration in the administration setup modules) allows OS Command Injection.This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.15, from 24.04.0 before 24.04.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-5965 is an OS Command Injection vulnerability classified under CWE-78 found in Centreon Infra Monitoring's backup configuration modules. The vulnerability arises because the software improperly neutralizes special characters or elements in backup parameters, allowing a user with high privileges to append arbitrary OS commands to the backup setup process. This can lead to execution of unintended commands on the underlying operating system with the privileges of the Centreon service or the user executing the backup. Affected versions include 24.04.0 prior to 24.04.19, 24.10.0 prior to 24.10.15, and 25.10.0 prior to 25.10.2. The CVSS v3.1 score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required high privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no exploits are publicly known, the vulnerability poses a significant risk because a compromised backup configuration can lead to arbitrary command execution, potentially allowing attackers to manipulate monitoring data, disrupt monitoring services, or pivot within the network. The vulnerability affects critical monitoring infrastructure, which is often integral to enterprise IT and industrial control environments. The flaw was reserved in June 2025 and published in January 2026, indicating a recent discovery and disclosure. The lack of patch links suggests users must rely on vendor advisories or updates to remediate.
Potential Impact
For European organizations, this vulnerability threatens the integrity and availability of critical infrastructure monitoring systems. Centreon Infra Monitoring is widely used in IT operations, telecommunications, energy, and manufacturing sectors across Europe. Exploitation could allow attackers to execute arbitrary commands, potentially disabling monitoring, falsifying alerts, or gaining further footholds in networks. This could lead to undetected outages, delayed incident response, and broader compromise of enterprise systems. The requirement for high privileges limits exploitation to insiders or attackers who have already escalated privileges, but the impact remains severe due to the critical role of monitoring systems. Disruption in sectors such as energy grids, transportation, and healthcare could have cascading effects on public safety and economic stability. Additionally, the ability to manipulate backup configurations may facilitate persistence and stealthy attacks, complicating forensic investigations and recovery efforts.
Mitigation Recommendations
Organizations should immediately identify all Centreon Infra Monitoring instances and verify their versions. They must upgrade affected versions to the latest patched releases: 24.04.19 or later, 24.10.15 or later, and 25.10.2 or later as provided by Centreon. Until patches are applied, restrict access to backup configuration modules strictly to trusted administrators and implement strong privilege management to minimize the number of users with high privileges. Conduct thorough audits of backup configurations to detect any unauthorized or suspicious command injections. Employ application-layer firewalls or intrusion detection systems to monitor and block anomalous command execution patterns related to Centreon processes. Regularly review logs for unusual activity around backup operations. Additionally, consider isolating monitoring infrastructure from general user networks to reduce attack surface. Engage with Centreon support for any available hotfixes or workarounds and monitor for updates or exploit reports.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-06-10T08:14:47.529Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695b8f06db813ff03e463837
Added to database: 1/5/2026, 10:14:30 AM
Last enriched: 1/12/2026, 9:11:50 PM
Last updated: 2/7/2026, 2:59:56 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.