{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3816","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-04-18T23:46:21.531Z","datePublished":"2025-04-19T18:00:08.256Z","dateUpdated":"2025-04-21T02:24:11.791Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-04-19T18:00:08.256Z"},"title":"westboy CicadasCMS Scheduled Task save os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"westboy","product":"CicadasCMS","versions":[{"version":"2.0","status":"affected"}],"modules":["Scheduled Task Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in westboy CicadasCMS 2.0. This vulnerability affects unknown code of the file /system/schedule/save of the component Scheduled Task Handler. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In westboy CicadasCMS 2.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Betroffen ist eine unbekannte Verarbeitung der Datei /system/schedule/save der Komponente Scheduled Task Handler. Durch Beeinflussen mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-04-18T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-04-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-04-19T01:51:32.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Unnlucky1 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.305722","name":"VDB-305722 | westboy CicadasCMS Scheduled Task save os command injection","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.305722","name":"VDB-305722 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.555555","name":"Submit #555555 | westboy CicadasCms v2.0 remote code execution","tags":["third-party-advisory"]},{"url":"https://github.com/chujianxin0101/vuln/issues/3","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-21T02:23:59.758078Z","id":"CVE-2025-3816","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-21T02:24:11.791Z"}}]}}