Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65791: n/a

0
Critical
VulnerabilityCVE-2025-65791cvecve-2025-65791
Published: Wed Feb 18 2026 (02/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:11:13 UTC

Technical Analysis

CVE-2025-65791 is a critical command injection vulnerability identified in ZoneMinder version 1.36.34, a widely used open-source video surveillance software. The vulnerability exists in the web/views/image.php file, where user-supplied input is passed directly to the PHP exec() function without proper sanitization or validation. This flaw corresponds to CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Because the exec() function executes system commands, an attacker can craft malicious input to execute arbitrary commands on the underlying operating system with the privileges of the web server process. The vulnerability requires no authentication and no user interaction, making it remotely exploitable over the network. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can potentially take full control of the affected system, access sensitive video feeds, manipulate or delete recordings, or disrupt surveillance operations. Although no public exploits have been reported yet, the straightforward nature of command injection and the criticality of the software's role in security monitoring elevate the risk. The vulnerability was reserved in November 2025 and published in February 2026, but no official patches or mitigations have been released at the time of this analysis.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on ZoneMinder for video surveillance in critical infrastructure, government facilities, transportation hubs, and private enterprises. Successful exploitation can lead to full system compromise, enabling attackers to access or manipulate surveillance footage, disable monitoring capabilities, or use the compromised system as a foothold for lateral movement within the network. This threatens physical security, data privacy, and operational continuity. Given the criticality of surveillance in sectors like public safety, energy, and transportation, disruption or compromise could have cascading effects on national security and public trust. Additionally, unauthorized access to video feeds may violate GDPR and other privacy regulations, exposing organizations to legal and financial penalties. The lack of authentication and user interaction requirements increases the likelihood of automated exploitation attempts, raising the urgency for European entities to address this vulnerability promptly.

Mitigation Recommendations

1. Immediately restrict network access to the ZoneMinder web interface, especially the vulnerable image.php endpoint, using firewalls or network segmentation to limit exposure to trusted users only. 2. Implement web application firewall (WAF) rules to detect and block suspicious command injection patterns targeting the exec() function. 3. Apply strict input validation and sanitization on all user-supplied data before it reaches any system command execution functions; if possible, disable or replace exec() calls with safer alternatives. 4. Monitor system logs and network traffic for unusual command execution or unexpected behavior indicative of exploitation attempts. 5. If feasible, isolate ZoneMinder servers in dedicated environments with minimal privileges to limit the impact of a potential compromise. 6. Stay alert for official patches or updates from ZoneMinder and apply them immediately once available. 7. Conduct regular security assessments and penetration tests focusing on web application vulnerabilities to detect similar issues proactively. 8. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving video surveillance system compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb4b8fb9188dea8c0df6

Added to database: 2/19/2026, 12:00:11 PM

Last enriched: 2/19/2026, 12:11:13 PM

Last updated: 2/21/2026, 12:16:09 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats