Php Command Injection (CVE-2025-65791) [PoC]
CVE-2025-65791
ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function....
Overview
A critical security vulnerability has been identified in ZoneMinder, a popular open-source video surveillance software. This flaw allows a remote attacker to execute arbitrary commands on the underlying server hosting the ZoneMinder application, potentially leading to a full system compromise.
Vulnerability Details
In affected versions, a specific component of the web interface (web/views/image.php) does not properly validate or sanitize user-supplied input. Instead, it passes this input directly to a powerful system function (exec()) that can run operating system commands. An attacker can exploit this by crafting a malicious web request containing commands, which the server will then execute with the same privileges as the ZoneMinder web service (often the www-data user or similar).
Impact
The impact of this vulnerability is severe (CVSS Score: 9.8). A successful exploit could allow an attacker to:
- Gain unauthorized access to the surveillance server.
- View, modify, or delete video footage and system files.
- Install malware or ransomware.
- Use the compromised server as a foothold to attack other devices on the internal network.
- Disrupt surveillance operations entirely.
Any ZoneMinder instance exposed to the internet or accessible by an untrusted user is at immediate risk.
Affected Versions
- ZoneMinder version 1.36.34 is confirmed vulnerable.
- Earlier versions may also be affected. Users should assume they are vulnerable if they are not on a patched version.
Remediation and Mitigation
Immediate Action Required:
-
Upgrade Immediately: The primary fix is to upgrade ZoneMinder to a patched version. Consult the official ZoneMinder releases or community announcements for the version that resolves CVE-2025-65791. Apply this update as soon as possible.
-
Network Mitigation (If Patching is Delayed):
- Restrict Network Access: Ensure the ZoneMinder web interface is not directly accessible from the internet. Place it behind a firewall and restrict access to only trusted IP addresses (e.g., your security office network).
- Use a Web Application Firewall (WAF): Deploying a WAF in front of the service can help block malicious requests that attempt to exploit command injection patterns.
-
General Security Best Practice:
- Ensure ZoneMinder runs with the minimum necessary system privileges.
- Maintain regular, offline backups of both configuration and video data.
- Monitor server logs for any suspicious activity or unexpected processes.
Note: Simply hiding the vulnerable page or relying on input filtering at other layers is not a sufficient long-term fix. The application code itself must be patched.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| rishavand1/CVE-2025-65791 CVE-2025-65791 — Command Injection in ZoneMinder | ★ 0 |
Showing 1 of 1 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated OS command injection via rc/index.php. The $param variable from user input is interpolated into a command string within double qu...
FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files c...
Winter is a free, open-source content management system (CMS) based on the Laravel PHP framework. Prior to 1.0.477, 1.1.12, and 1.2.12, Winter CMS allowed authenticated backend users to escalate their...
WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract(...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...