Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68154: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in sebhildebrandt systeminformation

0
High
VulnerabilityCVE-2025-68154cvecve-2025-68154cwe-78
Published: Tue Dec 16 2025 (12/16/2025, 18:18:03 UTC)
Source: CVE Database V5
Vendor/Project: sebhildebrandt
Product: systeminformation

Description

systeminformation is a System and OS information library for node.js. In versions prior to 5.27.14, the `fsSize()` function in systeminformation is vulnerable to OS command injection on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. The actual exploitability depends on how applications use this function. If an application does not pass user-controlled input to `fsSize()`, it is not vulnerable. Version 5.27.14 contains a patch.

AI-Powered Analysis

AILast updated: 12/23/2025, 19:26:56 UTC

Technical Analysis

CVE-2025-68154 is an OS command injection vulnerability classified under CWE-78 found in the systeminformation library for Node.js, a popular tool for retrieving system and OS information. The vulnerability exists in the fsSize() function on Windows platforms in versions prior to 5.27.14. The issue arises because the optional 'drive' parameter is concatenated directly into a PowerShell command string without any sanitization or validation. This allows an attacker who can influence the input to the 'drive' parameter to inject arbitrary PowerShell commands, leading to remote code execution. The exploitability depends on whether the application using systeminformation passes user-controlled input to fsSize(). If the input is controlled by an attacker, they can execute arbitrary commands with the privileges of the Node.js process. The vulnerability does not require authentication or user interaction, increasing its risk. The CVSS v3.1 score of 8.1 reflects high impact on confidentiality, integrity, and availability, but the attack complexity is high due to the need to influence the input parameter. The vulnerability was publicly disclosed on December 16, 2025, and fixed in version 5.27.14 of the library. No known exploits have been reported in the wild yet. Organizations using systeminformation on Windows should upgrade immediately and audit their code to ensure no untrusted input reaches fsSize().

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those running Node.js applications on Windows servers that utilize the systeminformation library. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, potentially leading to data theft, service disruption, or lateral movement within networks. This can impact confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability by disrupting services. Critical infrastructure, financial institutions, and enterprises with Windows-based Node.js environments are particularly vulnerable. Since the vulnerability requires no authentication or user interaction, it could be exploited remotely if the application exposes the vulnerable function to attacker-controlled input. The lack of known exploits currently provides a window for proactive mitigation, but the high CVSS score indicates that impact would be severe if exploited.

Mitigation Recommendations

1. Immediately upgrade the systeminformation library to version 5.27.14 or later where the vulnerability is patched. 2. Conduct a thorough code review to identify all usages of the fsSize() function and verify that no user-controlled input is passed to the 'drive' parameter. 3. Implement strict input validation and sanitization for any parameters that influence system commands, especially those passed to PowerShell or shell commands. 4. Employ application-level security controls such as Web Application Firewalls (WAFs) to detect and block suspicious command injection patterns. 5. Restrict the privileges of Node.js processes to minimize impact if exploitation occurs, following the principle of least privilege. 6. Monitor logs for unusual PowerShell command executions or unexpected systeminformation library calls. 7. Educate developers about secure coding practices related to command execution and parameter handling. 8. If upgrading immediately is not possible, consider isolating affected applications or disabling features that invoke fsSize() with external input until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T23:02:17.603Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941a4041a61eff6269a934d

Added to database: 12/16/2025, 6:25:08 PM

Last enriched: 12/23/2025, 7:26:56 PM

Last updated: 2/6/2026, 9:08:18 AM

Views: 262

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats