Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27772 | In UHCRTFDoc, the filename parameter can be exploited to execute arbitrary code via command injection into the system() call in the ConvertToPDF function. |
| Link | Providers |
|---|---|
| https://cert.pl/en/posts/2025/08/CVE-2025-2313/ |
|
Wed, 27 Aug 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cgm
Cgm clininet |
|
| Vendors & Products |
Cgm
Cgm clininet |
Wed, 27 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In UHCRTFDoc, the filename parameter can be exploited to execute arbitrary code via command injection into the system() call in the ConvertToPDF function. | |
| Title | Authenticated RCE with uhcapache privileges in ConvertToPDF | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-08-27T14:01:26.014Z
Reserved: 2025-03-14T14:55:39.571Z
Link: CVE-2025-30057
Updated: 2025-08-27T13:59:30.709Z
Status : Deferred
Published: 2025-08-27T11:15:37.980
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-30057
No data.
OpenCVE Enrichment
Updated: 2025-08-27T21:57:37Z
EUVD