CVE-2025-66224

Received
Published: 29 Nov 2025, 04:15
Last modified:29 Nov 2025, 04:15

Vulnerability Summary

Overall Risk
Medium Risk
36/100
CVSS Score
9 CRITICAL
CVSS v4.0 (SECURITY-ADVISORIES)
EPSS Score
0.07% INFO
0% probability 0.00%
CISA KEV
Not listed
Ransomware
No reports
Exploits
None found
Dark Web
Not detected
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application contains an input-neutralization flaw in its mail configuration and delivery workflow that allows user-controlled values to flow directly into the system’s sendmail command. Because these values are not sanitized or constrained before being incorporated into the command execution path, certain sendmail behaviors can be unintentionally invoked during email processing. This makes it possible for the application to write files on the server as part of the mail-handling routine, and in deployments where those files end up in web-accessible locations, the behavior can be leveraged to achieve execution of attacker-controlled content. The issue stems entirely from constructing OS-level command strings using unsanitized input within the mail-sending logic. This issue has been patched in version 5.8.
Source Identifier: security-advisories@github.com
CVSSSourceSeverityExploit.ImpactVector
v4.0security-advisories@github.com9 CRITICALNANA
CVSS:4.0/AV:N/AC:L/AT:P/P...
v3.1n/a
v3.0n/a
v2.0n/a
0.07%
Current Score
0.00%
22%ile
Percentile Rank
-0.01%
Loading chart...
Loading chart...
Improper Control of Generation of Code ('Code Injection') CWE-94
Description:The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

Not listed in CISA Known Exploited Vulnerabilities catalog.

No dark web activity detected for this vulnerability.

No known public exploit code indexed (as of 29 Nov 2025, 04:15).

Exploitation status can change quickly once PoC code appears.

No affected systems information available.

© 2025 CveMate. All rights reserved.v0.1.4