CVE-2025-50722
Published: 25 August 2025
Summary
CVE-2025-50722 is a critical-severity Command Injection (CWE-77) vulnerability in Sparkshop Sparkshop. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the insecure permissions flaw in Common.php of sparkshop v1.1.7 that enables arbitrary code execution.
Validates inputs to the Common.php component to prevent command injection exploits (CWE-77) leading to RCE.
Enforces access controls on the Common.php component to mitigate insecure permissions allowing unauthenticated remote access and code execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated command injection (CWE-77) in public-facing PHP app directly enables T1190 exploitation and T1059.004 Unix shell command execution.
NVD Description
Insecure Permissions vulnerability in sparkshop v.1.1.7 allows a remote attacker to execute arbitrary code via the Common.php component
Deeper analysisAI
CVE-2025-50722 is an Insecure Permissions vulnerability in sparkshop version 1.1.7. The issue resides in the Common.php component and enables a remote attacker to execute arbitrary code. Published on 2025-08-25, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-77.
The vulnerability can be exploited by any remote attacker requiring no privileges, low complexity, or user interaction. Exploitation occurs over the network and results in high impacts to confidentiality, integrity, and availability through arbitrary code execution.
Advisory details are provided in the reference at https://github.com/147536951/Qiany1/blob/main/SparkShop.pdf.
Details
- CWE(s)