Cyber Posture

CVE-2025-8259

HighPublic PoC

Published: 28 July 2025

Published
28 July 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0124 79.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-8259 is a high-severity Command Injection (CWE-77) vulnerability in Vaelsys Vaelsys. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 20.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents OS command injection by requiring validation of untrusted inputs like the xajaxargs argument in execute_DataObjectProc.

prevent

SI-2 mandates timely flaw remediation, such as upgrading VaelsysV4 to versions 5.1.1 or 5.4.1 to fix this command injection vulnerability.

prevent

RA-5 requires vulnerability scanning to identify and remediate specific flaws like CVE-2025-8259 prior to remote exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
Why these techniques?

Unauthenticated remote OS command injection in public-facing PHP web application (/grid/vgrid_server.php) enables T1190 (exploit public-facing app), T1059.004 (Unix shell execution via injection), and T1202 (indirect command execution as noted in VulDB).

NVD Description

A vulnerability was identified in Vaelsys VaelsysV4 up to 5.1.0/5.4.0. Affected by this issue is the function execute_DataObjectProc of the file /grid/vgrid_server.php of the component Web interface. Such manipulation of the argument xajaxargs leads to os command injection. The attack…

more

can be executed remotely. The exploit is publicly available and might be used. Upgrading to version 5.1.1 and 5.4.1 can resolve this issue. It is suggested to upgrade the affected component.

Deeper analysisAI

CVE-2025-8259 is an OS command injection vulnerability in Vaelsys VaelsysV4 versions up to 5.1.0 and 5.4.0. The flaw affects the execute_DataObjectProc function in the file /grid/vgrid_server.php within the Web interface component, where manipulation of the xajaxargs argument enables command injection (CWE-77, CWE-78).

The vulnerability is remotely exploitable by unauthenticated attackers (PR:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation can result in limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), yielding a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). A public exploit is available and might be used.

Vaelsys recommends upgrading to versions 5.1.1 or 5.4.1 to resolve the issue. Additional details are provided in the vendor's security advisory VSEC_V4_2025_07_0001 at https://vaelsys.github.io/security-advisory/advisories/VSEC_V4_2025_07_0001.html, with exploit documentation at https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Remote_Code_Execution_in_Vaelsys_V4_Platform.md and VulDB entries.

Details

CWE(s)

Affected Products

vaelsys
vaelsys
4.1.0

CVEs Like This One

CVE-2026-2952Same product: Vaelsys Vaelsys
CVE-2025-8261Same product: Vaelsys Vaelsys
CVE-2025-10328Shared CWE-77, CWE-78
CVE-2025-8828Shared CWE-77, CWE-78
CVE-2025-10327Shared CWE-77, CWE-78
CVE-2025-9575Shared CWE-77, CWE-78
CVE-2025-9026Shared CWE-77, CWE-78
CVE-2025-11138Shared CWE-77, CWE-78
CVE-2025-10326Shared CWE-77, CWE-78
CVE-2025-7414Shared CWE-77, CWE-78

References