CVE-2025-26014
Published: 21 February 2025
Summary
CVE-2025-26014 is a critical-severity Code Injection (CWE-94) vulnerability in Olajowon Loggrove. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents code injection RCE by requiring validation of path parameters to ensure they conform to safe, expected formats.
Mandates timely flaw remediation for the specific RCE vulnerability in Loggrove v1.0, eliminating the exploitable code injection issue.
Facilitates early detection of the CVE-2025-26014 vulnerability through regular scanning and monitoring, enabling patching before remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct RCE via code injection (CWE-94) on a public-facing application, matching T1190 exactly with network-exploitable unauthenticated access.
NVD Description
A Remote Code Execution (RCE) vulnerability in Loggrove v.1.0 allows a remote attacker to execute arbitrary code via the path parameter.
Deeper analysisAI
CVE-2025-26014, published on 2025-02-21, is a remote code execution (RCE) vulnerability in Loggrove version 1.0. The flaw allows a remote attacker to execute arbitrary code by exploiting the path parameter. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-94 (code injection).
The vulnerability enables exploitation over the network with low complexity, requiring no authentication, privileges, or user interaction, while maintaining an unchanged impact scope. A remote attacker can achieve high-impact compromise, including unauthorized access to confidential data, modification of system integrity, and disruption of availability through arbitrary code execution on the affected Loggrove instance.
Mitigation details and further information are referenced in the project's repositories on Gitee (https://gitee.com/olajowon/loggrove/ and https://gitee.com/olajowon/loggrove/issues/IBJT1K) and GitHub (https://github.com/olajowon/loggrove/).
Details
- CWE(s)