CVE-2025-34079
NSClient++ Authenticated Remote Code Execution via ExternalScripts API
Severity Score
7.5
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remote compromise. This capability is an intended feature, but the lack of safeguards or privilege separation makes it risky when exposed to untrusted actors.
*Credits:
kindredsec, Yann Castel
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-04-15 CVE Reserved
- 2025-07-02 CVE Published
- 2025-07-02 CVE Updated
- 2025-07-02 First Exploit
- 2025-07-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-306: Missing Authentication for Critical Function
CAPEC
- CAPEC-233: Privilege Escalation
- CAPEC-242: Code Injection
References (3)
URL | Tag | Source |
---|---|---|
https://vulncheck.com/advisories/nsclient-localtoremote-system-compromise | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
NSClient++ Search vendor "NSClient++" | NSClient++ Search vendor "NSClient++" for product "NSClient++" | 0.5.2.35 Search vendor "NSClient++" for product "NSClient++" and version "0.5.2.35" | en |
Affected
|