CVE-2025-34030
CRITICAL EXPLOITEDsar2html <3.2.2 - Command Injection
Title source: llmDescription
An OS command injection vulnerability exists in sar2html version 3.2.2 and prior via the plot parameter in index.php. The application fails to sanitize user-supplied input before using it in a system-level context. Remote, unauthenticated attackers can inject shell commands by appending them to the plot parameter (e.g., ?plot=;id) in a crafted GET request. The output of the command is displayed in the application's interface after interacting with the host selection UI. Successful exploitation leads to arbitrary command execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.
Exploits (2)
exploitdb
WORKING POC
by Cemal Cihad ÇİFTÇİ · textwebappsphp
https://www.exploit-db.com/exploits/47204
nomisec
WORKING POC
by HackerTyperAbuser · remote
https://github.com/HackerTyperAbuser/CVE-2025-34030-PoC
Scores
CVSS v4
10.0
EPSS
0.0394
EPSS Percentile
88.4%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Details
VulnCheck KEV
2025-06-20
CWE
CWE-78
Status
published
Products (1)
sar2html/sar2html
< 3.2.2
Published
Jun 20, 2025
Tracked Since
Feb 18, 2026