Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27770 | The "system" function receives untrusted input from the user. If the "EnableJSCaching" option is enabled, it is possible to execute arbitrary code provided as the "Module" parameter. |
| Link | Providers |
|---|---|
| https://cert.pl/en/posts/2025/08/CVE-2025-2313/ |
|
Wed, 27 Aug 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cgm
Cgm clininet |
|
| Vendors & Products |
Cgm
Cgm clininet |
Wed, 27 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The "system" function receives untrusted input from the user. If the "EnableJSCaching" option is enabled, it is possible to execute arbitrary code provided as the "Module" parameter. | |
| Title | Conditional RCE via the "system" function | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-08-27T13:24:16.973Z
Reserved: 2025-03-14T14:55:39.570Z
Link: CVE-2025-30055
Updated: 2025-08-27T13:24:11.496Z
Status : Deferred
Published: 2025-08-27T11:15:36.720
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-30055
No data.
OpenCVE Enrichment
Updated: 2025-08-27T21:57:32Z
EUVD