Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-25fp-8w8p-mx36 | OpenSTAManager has an OS Command Injection in P7M File Processing |
Mon, 09 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:devcode:openstamanager:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Devcode
Devcode openstamanager |
|
| Vendors & Products |
Devcode
Devcode openstamanager |
Fri, 06 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a critical OS Command Injection vulnerability exists in the P7M (signed XML) file decoding functionality. An authenticated attacker can upload a ZIP file containing a .p7m file with a malicious filename to execute arbitrary system commands on the server. | |
| Title | OpenSTAManager has an OS Command Injection in P7M File Processing | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-09T15:29:00.443Z
Reserved: 2025-12-29T15:00:37.380Z
Link: CVE-2025-69212
Updated: 2026-02-09T15:20:51.264Z
Status : Analyzed
Published: 2026-02-06T19:16:07.373
Modified: 2026-02-09T21:54:21.847
Link: CVE-2025-69212
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:50:22Z
Github GHSA