CVE-2025-49008 PUBLISHED

Atheos Improper Input Validation Vulnerability Enables RCE in Common.php

Assigner: GitHub_M
Reserved: 29.05.2025 Published: 05.06.2025 Updated: 05.06.2025

Atheos is a self-hosted browser-based cloud integrated development environment. Prior to version 6.0.4, improper use of escapeshellcmd() in /components/codegit/traits/execute.php allows argument injection, leading to arbitrary command execution. Atheos administrators and users of vulnerable versions are at risk of data breaches or server compromise. Version 6.0.4 introduces a Common::safe_execute function that sanitizes all arguments using escapeshellarg() prior to execution and migrated all components potentially vulnerable to similar exploits to use this new templated execution system.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor Atheos
Product Atheos
Versions
  • Version < 604 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE
  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE