CVE-2025-59783
Published: 04 March 2026
Summary
CVE-2025-59783 is a high-severity OS Command Injection (CWE-78) vulnerability in 2N Access Commander. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 34.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in network-accessible API endpoint directly enables remote arbitrary command execution (T1059) via public-facing application exploitation (T1190).
NVD Description
API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges.
Deeper analysisAI
CVE-2025-59783 is an OS command injection vulnerability (CWE-78) affecting the API endpoint for user synchronization in 2N Access Commander version 3.4.1. The issue arises from insufficient input validation, which allows malicious input to be processed as operating system commands. Published on 2026-03-04, it has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility and significant impacts on confidentiality, integrity, and availability.
Exploitation requires an attacker to first authenticate with administrator privileges on the affected system. Once authenticated, the attacker can inject and execute arbitrary OS commands remotely with low complexity and no user interaction required, potentially compromising the entire system.
The vendor has published an advisory with mitigation details, including a patch for 2N Access Commander version 3.5, available at https://www.2n.com/en-GB/download/cve_2025_59783_acom_3_5_v1pdf. Security practitioners should apply this update promptly to affected installations.
Details
- CWE(s)