Description
A vulnerability was identified in Vaelsys VaelsysV4 up to 5.1.0/5.4.0. Affected by this issue is the function execute_DataObjectProc of the file /grid/vgrid_server.php of the component Web interface. Such manipulation of the argument xajaxargs leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. Upgrading to version 5.1.1 and 5.4.1 can resolve this issue. It is suggested to upgrade the affected component.
References (8)
Core 8
Core References
Exploit, Third Party Advisory exploit
https://github.com/waiwai24/0101/blob/main/CVEs/Vaelsys/Remote_Code_Execution_in_Vaelsys_V4_Platform.md
Vdb Entry, Technical Description vdb-entry
technical-description
VDB-317847 | Vaelsys VaelsysV4 Web interface vgrid_server.php execute_DataObjectProc os command injection
https://vuldb.com/vuln/317847
Signature, Permissions Required signature
permissions-required
VDB-317847 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/vuln/317847/cti
Third Party Advisory third-party-advisory
Submit #616920 | Vaelsys Vaelsys V4 v4.1.0 Remote Code Execution in Vaelsys V4 Platform
https://vuldb.com/submit/616920
Permissions Required, VDB Entry
https://vuldb.com/?ctiid.317847
Third Party Advisory, VDB Entry
https://vuldb.com/?id.317847
Third Party Advisory, VDB Entry
https://vuldb.com/?submit.616920
Scores
CVSS v3
7.3
EPSS
0.0124
EPSS Percentile
79.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-77
CWE-78
Status
published
Products (9)
vaelsys/vaelsys
4.1.0
Vaelsys/VaelsysV4
5.0
Vaelsys/VaelsysV4
5.1
Vaelsys/VaelsysV4
5.1.0
Vaelsys/VaelsysV4
5.1.1
Vaelsys/VaelsysV4
5.2
Vaelsys/VaelsysV4
5.3
Vaelsys/VaelsysV4
5.4.0
Vaelsys/VaelsysV4
5.4.1
Published
Jul 28, 2025
Tracked Since
Feb 18, 2026