Description
A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation
References (3)
Core 3
Core References
Various Sources
https://github.com/ccurtsinger/stabilizer/
Third Party Advisory
https://github.com/ccurtsinger/stabilizer/blob/master/szc
Exploit, Third Party Advisory
https://github.com/h1dr1/CVE_Research/blob/main/CVE-2025-52365.md
Scores
CVSS v3
7.8
EPSS
0.0013
EPSS Percentile
32.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-77
Status
published
Published
Mar 03, 2026
Tracked Since
Mar 03, 2026