Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25108: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Soliton Systems K.K. FileZen

0
High
VulnerabilityCVE-2026-25108cvecve-2026-25108
Published: Fri Feb 13 2026 (02/13/2026, 03:39:03 UTC)
Source: CVE Database V5
Vendor/Project: Soliton Systems K.K.
Product: FileZen

Description

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:35:43 UTC

Technical Analysis

CVE-2026-25108 is an OS command injection vulnerability identified in Soliton Systems K.K.'s FileZen product, specifically affecting versions 5.0.0 through 5.0.10. The vulnerability arises when the FileZen Antivirus Check Option is enabled, which improperly neutralizes special elements in user-supplied input within HTTP requests. A logged-in user can exploit this flaw by crafting a malicious HTTP request that injects arbitrary OS commands, which the system then executes with the privileges of the FileZen service. This type of vulnerability allows attackers to execute commands on the underlying operating system, potentially leading to full system compromise. The CVSS v3.0 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network, low attack complexity, and requiring only privileges of a logged-in user (no additional user interaction). The vulnerability does not require user interaction beyond authentication, making it easier to exploit in environments where user credentials are compromised or where users have legitimate access. Although no public exploits have been reported yet, the vulnerability's nature and impact warrant urgent attention. The lack of available patches at the time of reporting suggests that organizations must implement interim mitigations to reduce risk. This vulnerability is particularly critical for organizations relying on FileZen for secure file transfer and management, as compromise could lead to data breaches, system disruption, or lateral movement within networks.

Potential Impact

The impact of CVE-2026-25108 is significant for organizations worldwide using FileZen versions 5.0.0 to 5.0.10 with the Antivirus Check Option enabled. Successful exploitation allows an authenticated user to execute arbitrary OS commands, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, data tampering, service disruption, or the attacker establishing persistent footholds within the network. Given FileZen's role in secure file transfer and management, exploitation could expose sensitive corporate or customer data, disrupt business operations, and damage organizational reputation. The vulnerability's network accessibility and low complexity of attack increase the risk of exploitation in environments where user credentials are available or where insider threats exist. Organizations in sectors with high data sensitivity, such as finance, healthcare, government, and critical infrastructure, face heightened risks. Additionally, the absence of known exploits in the wild currently does not preclude rapid weaponization, especially if threat actors target this vulnerability in the future.

Mitigation Recommendations

To mitigate CVE-2026-25108, organizations should take the following specific actions: 1) Immediately verify whether the FileZen Antivirus Check Option is enabled and consider disabling it temporarily if operationally feasible until a patch is available. 2) Restrict access to the FileZen management interface to trusted networks and users only, using network segmentation and firewall rules to limit exposure. 3) Enforce strong authentication and monitor for unusual login activity to detect potential misuse of legitimate credentials. 4) Implement web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious HTTP requests that may contain command injection payloads. 5) Conduct thorough logging and monitoring of FileZen HTTP requests and system commands to identify potential exploitation attempts early. 6) Engage with Soliton Systems K.K. for official patches or updates addressing this vulnerability and apply them promptly once released. 7) Educate users with access about the risks and encourage reporting of suspicious behavior. 8) Consider deploying endpoint detection and response (EDR) solutions to detect anomalous command execution on affected systems. These measures, combined, reduce the attack surface and improve detection and response capabilities until a permanent fix is applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-01-30T11:03:04.608Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 698ea641c9e1ff5ad8e3f0c2

Added to database: 2/13/2026, 4:19:13 AM

Last enriched: 2/28/2026, 12:35:43 AM

Last updated: 4/5/2026, 4:33:31 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses