Description
Sites running NOAA PMEL Live Access Server (LAS) are vulnerable to remote code execution via specially crafted requests that include PyFerret expressions. By leveraging a SPAWN command, a remote, unauthenticated attacker can execute arbitrary OS commands. Fixed in a version of 'gov.noaa.pmel.tmap.las.filter.RequestInputFilter.java' from 2025-09-24.
References (7)
Core 7
Core References
Various Sources vdb-entry
https://www.cve.org/CVERecord?id=CVE-2025-62193
Various Sources third-party-advisory
government-resource
https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2025/va-26-015-01.json
Various Sources patch
https://github.com/NOAA-PMEL/LAS/compare/b4b7306..de5f923
Various Sources product
https://github.com/NOAA-PMEL/LAS/tree/main
Scores
CVSS v3
9.8
EPSS
0.0030
EPSS Percentile
53.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (1)
National Oceanic and Atmospheric Administration (NOAA)/Live Access Server (LAS)
8 (2 CPE variants)
Published
Jan 15, 2026
Tracked Since
Feb 18, 2026