CVE-2025-59741
Published: 02 October 2025
Summary
CVE-2025-59741 is a critical-severity Command Injection (CWE-77) vulnerability in Andsoft E-Tms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents OS command injection by requiring validation of the unsanitized 'm' parameter in POST requests to '/CLT/LOGINERRORFRM.ASP'.
SI-2 mitigates the vulnerability by identifying, reporting, and correcting the specific flaw in e-TMS v25.03 through timely vendor patching.
SI-9 prevents exploitation by restricting the 'm' parameter to organization-defined safe inputs, blocking malicious command injection payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote command injection in a public-facing ASP web endpoint enables exploitation of public-facing applications (T1190) and arbitrary Windows command execution (T1059.003).
NVD Description
Operating system command injection vulnerability in AndSoft's e-TMS v25.03. This vulnerability allows an attacker to execute operating system commands on the server by sending a POST request. The relationship between parameter and assigned identifier is a 'm' parameter in '/CLT/LOGINERRORFRM.ASP'.
Deeper analysisAI
CVE-2025-59741 is an operating system command injection vulnerability (CWE-77, CWE-78) affecting AndSoft's e-TMS version 25.03. The flaw resides in the handling of the 'm' parameter within the '/CLT/LOGINERRORFRM.ASP' endpoint, where unsanitized input from a POST request enables arbitrary command execution on the server. Assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it represents critical risk due to its high impact on confidentiality, integrity, and availability.
The vulnerability can be exploited remotely over the network by unauthenticated attackers with no privileges or user interaction required. By crafting a malicious POST request to the affected endpoint, an attacker can inject and execute arbitrary operating system commands on the server, potentially leading to full system compromise, data exfiltration, persistence, or further lateral movement within the environment.
INCIBE-CERT has issued an advisory detailing multiple vulnerabilities in AndSoft's e-TMS, including this one, under notice "update-24092025-multiple-vulnerabilities-andsofts-e-tms," recommending updates to mitigate the risks. Security practitioners should verify patch availability from the vendor and apply them promptly, alongside input validation and network segmentation as interim controls.
Details
- CWE(s)