CVE-2025-34030

CRITICAL EXPLOITED

sar2html <3.2.2 - Command Injection

Title source: llm

Description

An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.

Exploits (2)

exploitdb WORKING POC
by Cemal Cihad ÇİFTÇİ · textwebappsphp
https://www.exploit-db.com/exploits/47204
nomisec WORKING POC
by HackerTyperAbuser · remote
https://github.com/HackerTyperAbuser/CVE-2025-34030-PoC

Scores

CVSS v4 10.0
EPSS 0.0394
EPSS Percentile 88.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Details

VulnCheck KEV 2025-06-20
CWE
CWE-78
Status published
Products (1)
sar2html/sar2html < 3.2.2
Published Jun 20, 2025
Tracked Since Feb 18, 2026