CVE-2025-5952 PUBLISHED

Zend.To NSSDropoff.php exec os command injection

Assigner: VulDB
Reserved: 09.06.2025 Published: 10.06.2025 Updated: 10.06.2025

A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release. Additional countermeasures have been added in 6.15-8.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor n/a
Product Zend.To
Versions
  • Version 6.10-6 Beta is affected

Credits

  • pnshbr (VulDB User) reporter

References

Problem Types

  • OS Command Injection CWE
  • Command Injection CWE