Cyber Posture

CVE-2025-55055

MediumRCE

Published: 17 November 2025

Published
17 November 2025
Modified
24 November 2025
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0006 17.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55055 is a medium-severity OS Command Injection (CWE-78) vulnerability in Maxum Rumpus. Its CVSS base score is 6.8 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 17.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Command and Scripting Interpreter (T1059) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly counters CWE-78 OS command injection by requiring validation and neutralization of special elements in inputs to OS commands.

prevent

Remediates the specific CVE-2025-55055 flaw through timely installation of vendor-provided patches addressing the improper neutralization.

prevent

Reduces the attack surface and potential impact of exploitation by enforcing least privilege, given the PR:H requirement.

MITRE ATT&CK Enterprise TechniquesAI

T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

OS Command Injection (CWE-78) directly enables arbitrary command execution via OS interpreters (T1059) and represents exploitation of a remote service vulnerability (T1210).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Deeper analysisAI

CVE-2025-55055, published on 2025-11-17T18:15:57.033, is classified as CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). It carries a CVSS v3.1 base score of 6.8 (AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H). The specific software or component affected is not identified in the provided details.

The vulnerability can be exploited over the network with low attack complexity by an attacker possessing high privileges (PR:H), requiring user interaction (UI:R) to succeed. Successful exploitation enables high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) without changing scope.

Advisories are available via the Israeli government site at https://www.gov.il/en/departments/dynamiccollectors/cve_advisories_listing?skip=0, which lists CVE details for mitigation guidance.

Details

CWE(s)

Affected Products

maxum
rumpus
9.0.12

CVEs Like This One

CVE-2025-55058Same product: Maxum Rumpus
CVE-2025-11787Shared CWE-78
CVE-2025-44961Shared CWE-78
CVE-2026-33613Shared CWE-78
CVE-2026-25105Shared CWE-78
CVE-2026-1428Shared CWE-78
CVE-2025-30479Shared CWE-78
CVE-2026-24452Shared CWE-78
CVE-2026-5707Shared CWE-78
CVE-2026-20764Shared CWE-78

References