Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63334: n/a

0
Critical
VulnerabilityCVE-2025-63334cvecve-2025-63334
Published: Wed Nov 05 2025 (11/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-63334 is a critical unauthenticated remote code execution vulnerability in PocketVJ CP version 3. 9. 1, specifically in the submit_opacity. php component. The vulnerability arises because the opacityValue POST parameter is not sanitized before being passed to a shell command, allowing attackers to execute arbitrary commands as root. This flaw requires no authentication or user interaction and can lead to full system compromise. Although no known exploits are currently reported in the wild, the high CVSS score of 9. 8 indicates severe risk. European organizations using PocketVJ CP are at risk of complete confidentiality, integrity, and availability loss. Immediate mitigation involves restricting access to the vulnerable endpoint, applying patches when available, and implementing input validation and command execution safeguards.

AI-Powered Analysis

AILast updated: 11/12/2025, 20:18:39 UTC

Technical Analysis

CVE-2025-63334 is a critical remote code execution (RCE) vulnerability found in PocketVJ CP version 3.9.1, a software product used in video and media processing environments. The vulnerability exists in the submit_opacity.php script, where the opacityValue parameter received via POST requests is directly passed to a shell command without proper sanitization or validation. This lack of input sanitization leads to command injection (CWE-78), enabling unauthenticated remote attackers to execute arbitrary shell commands with root privileges on the underlying system. The vulnerability requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers seeking full system compromise. The absence of patches or mitigation details in the provided data suggests that organizations must implement interim controls to reduce exposure. This vulnerability could allow attackers to gain root shell access, manipulate or exfiltrate sensitive data, disrupt services, or pivot within networks.

Potential Impact

For European organizations, the impact of CVE-2025-63334 is severe. Exploitation leads to full system compromise with root privileges, threatening confidentiality, integrity, and availability of critical systems. Organizations in media production, broadcasting, and related sectors using PocketVJ CP software are at heightened risk. Attackers could deploy ransomware, steal intellectual property, disrupt broadcasting services, or use compromised systems as footholds for further network intrusion. The unauthenticated nature of the vulnerability means attackers can exploit it remotely without prior access, increasing the attack surface. This could result in significant operational downtime, regulatory penalties under GDPR if personal data is compromised, and reputational damage. The lack of known exploits currently may provide a window for proactive defense, but the critical severity demands urgent attention to prevent potential widespread exploitation.

Mitigation Recommendations

1. Immediately restrict network access to the submit_opacity.php endpoint, ideally limiting it to trusted internal IP addresses or VPN users. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the opacityValue parameter. 3. Implement strict input validation and sanitization on all user-supplied data, especially parameters passed to shell commands, to prevent command injection. 4. Disable or isolate the vulnerable component if possible until an official patch or update is released by the vendor. 5. Monitor system logs and network traffic for unusual command execution or access attempts related to the submit_opacity.php script. 6. Conduct a thorough audit of all systems running PocketVJ CP to identify and prioritize remediation efforts. 7. Prepare incident response plans to quickly contain and remediate any exploitation attempts. 8. Engage with the vendor for timely patches and security advisories and apply updates as soon as they become available. 9. Consider deploying application sandboxing or privilege restrictions to limit the impact of potential command execution. 10. Educate IT and security teams about this vulnerability and the importance of securing web-facing applications against injection attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690bacf6976718a73306413d

Added to database: 11/5/2025, 8:00:54 PM

Last enriched: 11/12/2025, 8:18:39 PM

Last updated: 12/20/2025, 4:11:08 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats