CVE-2025-34099 PUBLISHED

VICIdial vicidial_sales_viewer.php Unauthenticated Command Injection via Basic Auth Password

Assigner: VulnCheck
Reserved: 15.04.2025 Published: 10.07.2025 Updated: 14.07.2025

An unauthenticated command injection vulnerability exists in VICIdial versions 2.9 RC1 through 2.13 RC1, within the vicidial_sales_viewer.php component when password encryption is enabled (a non-default configuration). The application improperly passes the HTTP Basic Authentication password directly to a call to exec() without adequate sanitation. This allows remote attackers to inject and execute arbitrary operating system commands as the web server user.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor VICIdial Group
Product VICIdial
Versions Default: unaffected
  • affected from 2.9 RC1 to 2.13 RC1 (incl.)

Credits

  • bcoles finder

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE
  • CWE-20 Improper Input Validation CWE

Impacts

  • CAPEC-88 OS Command Injection