CVE-2025-66022: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in factionsecurity faction
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
AI Analysis
Technical Summary
CVE-2025-66022 is a critical vulnerability in the Faction PenTesting Report Generation and Collaboration Framework, specifically affecting versions prior to 1.7.1. The root cause is an insecure extension execution path within Faction’s extension framework that permits untrusted extension code to execute arbitrary system commands on the host server. This is compounded by a missing authentication check on the /portal/AppStoreDashboard endpoint, which allows unauthenticated attackers to access the extension management UI. Through this interface, attackers can upload malicious extensions that execute arbitrary code during lifecycle hook invocations, resulting in remote code execution (RCE) on the server. The vulnerability is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) and CWE-287 (Improper Authentication). The CVSS v3.1 score of 9.7 indicates a critical severity with network attack vector, no privileges required, low attack complexity, and user interaction required, but with a scope change and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it highly exploitable. The vendor has addressed the issue in version 1.7.1 by implementing proper authentication checks and securing the extension execution path. Organizations running vulnerable versions are at risk of full system compromise, data breaches, and disruption of services.
Potential Impact
For European organizations, the impact of CVE-2025-66022 can be severe. Since Faction is used for penetration testing report generation and collaboration, a successful exploit could lead to unauthorized access to sensitive security assessment data, intellectual property, and internal network information. The remote code execution capability allows attackers to execute arbitrary commands on the host, potentially leading to full system compromise, lateral movement within networks, data exfiltration, and disruption of critical security operations. This could undermine trust in security teams and expose organizations to regulatory penalties under GDPR due to data breaches. The unauthenticated nature of the exploit increases the risk, as attackers do not need valid credentials or insider access. Organizations relying on Faction for security workflows may face operational downtime and reputational damage if exploited. The threat is particularly relevant for cybersecurity firms, managed security service providers (MSSPs), and enterprises conducting internal or external penetration testing in Europe.
Mitigation Recommendations
1. Immediately upgrade all Faction installations to version 1.7.1 or later, where the vulnerability is patched. 2. If immediate upgrade is not possible, restrict network access to the /portal/AppStoreDashboard endpoint using firewall rules, VPNs, or IP whitelisting to prevent unauthenticated access. 3. Implement strict access controls and monitoring on the extension management interface to detect unauthorized uploads or suspicious activity. 4. Conduct thorough audits of installed extensions to identify and remove any untrusted or unknown extensions. 5. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block malicious requests targeting the extension upload functionality. 6. Regularly review and update authentication and authorization mechanisms for all administrative interfaces. 7. Monitor system logs for unusual command execution patterns or lifecycle hook invocations indicative of exploitation attempts. 8. Educate security teams about this vulnerability and ensure incident response plans include steps for rapid containment and remediation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium, Italy
CVE-2025-66022: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in factionsecurity faction
Description
FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, an extension execution path in Faction’s extension framework permits untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, resulting in remote code execution (RCE) on the host running Faction. Due to a missing authentication check on the /portal/AppStoreDashboard endpoint, an attacker can access the extension management UI and upload a malicious extension without any authentication, making this vulnerability exploitable by unauthenticated users. This issue has been patched in version 1.7.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-66022 is a critical vulnerability in the Faction PenTesting Report Generation and Collaboration Framework, specifically affecting versions prior to 1.7.1. The root cause is an insecure extension execution path within Faction’s extension framework that permits untrusted extension code to execute arbitrary system commands on the host server. This is compounded by a missing authentication check on the /portal/AppStoreDashboard endpoint, which allows unauthenticated attackers to access the extension management UI. Through this interface, attackers can upload malicious extensions that execute arbitrary code during lifecycle hook invocations, resulting in remote code execution (RCE) on the server. The vulnerability is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) and CWE-287 (Improper Authentication). The CVSS v3.1 score of 9.7 indicates a critical severity with network attack vector, no privileges required, low attack complexity, and user interaction required, but with a scope change and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability’s characteristics make it highly exploitable. The vendor has addressed the issue in version 1.7.1 by implementing proper authentication checks and securing the extension execution path. Organizations running vulnerable versions are at risk of full system compromise, data breaches, and disruption of services.
Potential Impact
For European organizations, the impact of CVE-2025-66022 can be severe. Since Faction is used for penetration testing report generation and collaboration, a successful exploit could lead to unauthorized access to sensitive security assessment data, intellectual property, and internal network information. The remote code execution capability allows attackers to execute arbitrary commands on the host, potentially leading to full system compromise, lateral movement within networks, data exfiltration, and disruption of critical security operations. This could undermine trust in security teams and expose organizations to regulatory penalties under GDPR due to data breaches. The unauthenticated nature of the exploit increases the risk, as attackers do not need valid credentials or insider access. Organizations relying on Faction for security workflows may face operational downtime and reputational damage if exploited. The threat is particularly relevant for cybersecurity firms, managed security service providers (MSSPs), and enterprises conducting internal or external penetration testing in Europe.
Mitigation Recommendations
1. Immediately upgrade all Faction installations to version 1.7.1 or later, where the vulnerability is patched. 2. If immediate upgrade is not possible, restrict network access to the /portal/AppStoreDashboard endpoint using firewall rules, VPNs, or IP whitelisting to prevent unauthenticated access. 3. Implement strict access controls and monitoring on the extension management interface to detect unauthorized uploads or suspicious activity. 4. Conduct thorough audits of installed extensions to identify and remove any untrusted or unknown extensions. 5. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block malicious requests targeting the extension upload functionality. 6. Regularly review and update authentication and authorization mechanisms for all administrative interfaces. 7. Monitor system logs for unusual command execution patterns or lifecycle hook invocations indicative of exploitation attempts. 8. Educate security teams about this vulnerability and ensure incident response plans include steps for rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-21T01:08:02.613Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692669caca41832e1e64f236
Added to database: 11/26/2025, 2:45:30 AM
Last enriched: 11/26/2025, 3:00:28 AM
Last updated: 11/26/2025, 8:00:27 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9558: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in zephyrproject-rtos Zephyr
HighCVE-2025-9557: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in zephyrproject-rtos Zephyr
HighCVE-2025-13735: CWE-125 Out-of-bounds Read in ASR Lapwing_Linux
HighCVE-2025-59820: CWE-1284 Improper Validation of Specified Quantity in Input in KDE Krita
MediumCVE-2025-12061: CWE-862 Missing Authorization in TAX SERVICE Electronic HDM
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.