CVE-2025-65791: n/a
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function. NOTE: this is disputed by the Supplier because there is no unsanitized user input to web/views/image.php.
AI Analysis
Technical Summary
CVE-2025-65791 identifies a critical command injection vulnerability in ZoneMinder version 1.36.34, specifically within the web/views/image.php file. The vulnerability arises because the application allegedly passes unsanitized user input directly to the PHP exec() function, which executes system-level commands. This flaw allows an unauthenticated remote attacker to inject arbitrary commands, leading to full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), which is a common and dangerous class of injection flaws. The supplier disputes the vulnerability, claiming no unsanitized input reaches the vulnerable code path, but the CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the potential for remote exploitation without privileges or user interaction, resulting in complete confidentiality, integrity, and availability loss. No patches or fixes have been released yet, and no known exploits are reported in the wild. ZoneMinder is an open-source video surveillance software widely used in various sectors, making this vulnerability particularly concerning for organizations relying on it for security monitoring. The lack of authentication requirement and ease of exploitation make this a critical threat that could allow attackers to take control of surveillance infrastructure, manipulate video feeds, or disrupt monitoring capabilities.
Potential Impact
The impact of CVE-2025-65791 is severe for organizations worldwide using ZoneMinder for video surveillance and security monitoring. Successful exploitation allows remote attackers to execute arbitrary commands on the affected server without any authentication or user interaction, leading to full system compromise. This can result in unauthorized access to sensitive video feeds, manipulation or deletion of surveillance data, disruption of security operations, and potential lateral movement within the network. The confidentiality, integrity, and availability of the surveillance system are all at risk, which could undermine physical security and incident response capabilities. Organizations in critical infrastructure, government, transportation, and private sectors relying on ZoneMinder are particularly vulnerable. The absence of patches increases the window of exposure, and the high CVSS score underscores the urgency. Although no exploits are currently known in the wild, the simplicity of exploitation and the critical nature of the vulnerability make it a prime target for attackers once weaponized.
Mitigation Recommendations
Given the absence of an official patch, organizations should immediately implement the following mitigations: 1) Restrict network access to the ZoneMinder web interface by implementing strict firewall rules and VPN-only access to reduce exposure to untrusted networks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the exec() function or command injection attempts. 3) Conduct thorough code reviews and apply temporary input sanitization or validation in the web/views/image.php file to prevent unsanitized input from reaching exec() calls. 4) Monitor logs for unusual command execution patterns or unexpected system behavior indicative of exploitation attempts. 5) Isolate ZoneMinder servers in segmented network zones with limited privileges to minimize lateral movement if compromised. 6) Engage with the ZoneMinder community and vendor for updates and patches, and plan for rapid deployment once available. 7) Consider alternative surveillance solutions or temporary suspension of vulnerable services if risk is unacceptable. These steps go beyond generic advice by focusing on network segmentation, proactive detection, and temporary code-level mitigations.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Italy
CVE-2025-65791: n/a
Description
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function. NOTE: this is disputed by the Supplier because there is no unsanitized user input to web/views/image.php.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-65791 identifies a critical command injection vulnerability in ZoneMinder version 1.36.34, specifically within the web/views/image.php file. The vulnerability arises because the application allegedly passes unsanitized user input directly to the PHP exec() function, which executes system-level commands. This flaw allows an unauthenticated remote attacker to inject arbitrary commands, leading to full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), which is a common and dangerous class of injection flaws. The supplier disputes the vulnerability, claiming no unsanitized input reaches the vulnerable code path, but the CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the potential for remote exploitation without privileges or user interaction, resulting in complete confidentiality, integrity, and availability loss. No patches or fixes have been released yet, and no known exploits are reported in the wild. ZoneMinder is an open-source video surveillance software widely used in various sectors, making this vulnerability particularly concerning for organizations relying on it for security monitoring. The lack of authentication requirement and ease of exploitation make this a critical threat that could allow attackers to take control of surveillance infrastructure, manipulate video feeds, or disrupt monitoring capabilities.
Potential Impact
The impact of CVE-2025-65791 is severe for organizations worldwide using ZoneMinder for video surveillance and security monitoring. Successful exploitation allows remote attackers to execute arbitrary commands on the affected server without any authentication or user interaction, leading to full system compromise. This can result in unauthorized access to sensitive video feeds, manipulation or deletion of surveillance data, disruption of security operations, and potential lateral movement within the network. The confidentiality, integrity, and availability of the surveillance system are all at risk, which could undermine physical security and incident response capabilities. Organizations in critical infrastructure, government, transportation, and private sectors relying on ZoneMinder are particularly vulnerable. The absence of patches increases the window of exposure, and the high CVSS score underscores the urgency. Although no exploits are currently known in the wild, the simplicity of exploitation and the critical nature of the vulnerability make it a prime target for attackers once weaponized.
Mitigation Recommendations
Given the absence of an official patch, organizations should immediately implement the following mitigations: 1) Restrict network access to the ZoneMinder web interface by implementing strict firewall rules and VPN-only access to reduce exposure to untrusted networks. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the exec() function or command injection attempts. 3) Conduct thorough code reviews and apply temporary input sanitization or validation in the web/views/image.php file to prevent unsanitized input from reaching exec() calls. 4) Monitor logs for unusual command execution patterns or unexpected system behavior indicative of exploitation attempts. 5) Isolate ZoneMinder servers in segmented network zones with limited privileges to minimize lateral movement if compromised. 6) Engage with the ZoneMinder community and vendor for updates and patches, and plan for rapid deployment once available. 7) Consider alternative surveillance solutions or temporary suspension of vulnerable services if risk is unacceptable. These steps go beyond generic advice by focusing on network segmentation, proactive detection, and temporary code-level mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6996fb4b8fb9188dea8c0df6
Added to database: 2/19/2026, 12:00:11 PM
Last enriched: 3/11/2026, 7:10:04 PM
Last updated: 4/6/2026, 9:55:38 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.