CVE-2025-11900
Published: 17 October 2025
Summary
CVE-2025-11900 is a critical-severity OS Command Injection (CWE-78) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely remediation of the specific OS command injection flaw in iSherlock via patching as detailed in CVE-2025-11900.
SI-10 directly prevents OS command injection by validating and sanitizing unauthenticated remote inputs before system command execution.
RA-5 identifies the command injection vulnerability in iSherlock through vulnerability scanning to enable remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection in a network-exposed product directly enables exploitation of a public-facing application (T1190) and execution via command and scripting interpreter (T1059).
NVD Description
The iSherlock developed by HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.
Deeper analysisAI
CVE-2025-11900 is an OS Command Injection vulnerability (CWE-78) affecting iSherlock, a product developed by HGiga. Published on 2025-10-17, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity due to the potential for high impacts on confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required. Exploitation enables attackers to inject and execute arbitrary OS commands on the server, allowing full control over the affected system.
Advisories from TWCERT detail mitigation guidance and are available at https://www.twcert.org.tw/en/cp-139-10441-00aaf-2.html and https://www.twcert.org.tw/tw/cp-132-10440-dd55d-1.html.
Details
- CWE(s)