CVE-2025-5243
Published: 24 July 2025
Summary
CVE-2025-5243 is a critical-severity OS Command Injection (CWE-78) vulnerability in Gov (inferred from references). Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates and sanitizes file uploads and OS command inputs to block unrestricted uploads of dangerous types and command injection exploits.
Enforces restrictions on file types and input parameters at web upload interfaces to prevent acceptance of dangerous files leading to web shells.
Requires timely patching of the vulnerable Information Portal software versions prior to 13.06.2025 to remediate the unrestricted upload and OS command injection flaws.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directly enables remote exploitation of public-facing web app (T1190) to upload and execute web shell (T1505.003) via unrestricted file upload + OS command injection.
NVD Description
Unrestricted Upload of File with Dangerous Type, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SMG Software Information Portal allows Code Injection, Upload a Web Shell to a Web Server, Code Inclusion.This issue…
more
affects Information Portal: before 13.06.2025.
Deeper analysisAI
CVE-2025-5243 is an Unrestricted Upload of File with Dangerous Type combined with Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in the SMG Software Information Portal. This issue, linked to CWE-78 and CWE-434, affects versions of the Information Portal prior to 13.06.2025. It enables code injection, uploading a web shell to a web server, and code inclusion.
The vulnerability carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), making it exploitable over the network by unauthenticated attackers with low attack complexity and no user interaction required. Successful exploitation results in high impacts to confidentiality, integrity, and availability, with a change in scope, allowing attackers to inject code, upload web shells, and achieve code inclusion for full server compromise.
Mitigation details are available in the advisory published by USOM at https://www.usom.gov.tr/bildirim/tr-25-0174.
Details
- CWE(s)