CVE-2025-59783 PUBLISHED

OS Command Injection over API

Assigner: 2N
Reserved: 19.09.2025 Published: 04.03.2026 Updated: 04.03.2026

API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 8.8

Product Status

Vendor 2N Telekomunikace a.s.
Product 2N Access Commander
Versions Default: unaffected
  • affected from 0 to 3.4.2 (excl.)

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE

Impacts

  • CAPEC-88 OS Command Injection