CVE-2025-36846
Published: 21 July 2025
Summary
CVE-2025-36846 is a critical-severity OS Command Injection (CWE-78) vulnerability in Eveo Urve Web Manager. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 2.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates OS command injection by requiring validation and sanitization of the input parameter passed to PHP's shell_exec() function.
Requires identification, reporting, and correction of the specific command injection flaw in the /_internal/pc/vpro.php endpoint, such as through vendor patches.
Enforces logical access controls to prevent unauthenticated remote access to the exposed internal endpoint vulnerable to command injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated OS command injection in a web endpoint enables remote exploitation of public-facing application (T1190) and arbitrary Unix shell command execution (T1059.004).
NVD Description
An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec()…
more
function of PHP. NOTE: this can be chained with CVE-2025-36845.
Deeper analysisAI
CVE-2025-36846 is an OS command injection vulnerability (CWE-78) in Eveo URVE Web Manager version 27.02.2025. The affected component is the /_internal/pc/vpro.php endpoint, which is exposed to unauthenticated users despite its localhost designation. This endpoint accepts an input parameter that is passed directly to PHP's shell_exec() function without sanitization, enabling arbitrary command execution on the underlying operating system. The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and can be chained with CVE-2025-36845.
Remote unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By sending a crafted request to the vulnerable endpoint, attackers can inject and execute arbitrary operating system commands, potentially leading to full system compromise, including high-impact confidentiality, integrity, and availability violations such as data exfiltration, modification, or denial of service.
Advisories detailing the issue are available from SYSS (SYSS-2025-034.txt) and the vendor site at smartoffice.expert/en. Security practitioners should consult these for specific mitigation guidance, such as applying patches if available or implementing network access controls to block unauthorized access to the endpoint.
Details
- CWE(s)