CVE-2025-34095
Mako Server v2.5 and v2.6 OS Command Injection via examples/save.lsp
Severity Score
9.3
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
An OS command injection vulnerability exists in Mako Server versions 2.5 and 2.6, specifically within the tutorial interface provided by the examples/save.lsp endpoint. An unauthenticated attacker can send a crafted PUT request containing arbitrary Lua os.execute() code, which is then persisted on disk and triggered via a subsequent GET request to examples/manage.lsp. This allows remote command execution on the underlying operating system, impacting both Windows and Unix-based deployments.
*Credits:
John Page (hyp3rlinx) of Beyond Security SecuriTeam Secure Disclosure
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2025-04-15 CVE Reserved
- 2025-07-10 CVE Published
- 2025-07-11 CVE Updated
- 2025-07-11 First Exploit
- 2025-07-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
- CAPEC-88: OS Command Injection
- CAPEC-137: Parameter Injection
References (3)
URL | Tag | Source |
---|---|---|
https://vulncheck/advisories/mako-server-rce | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/makoserver_cmd_exec.rb | 2025-07-11 | |
https://www.exploit-db.com/exploits/43132 | 2025-07-11 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Real Time Logic Search vendor "Real Time Logic" | Mako Server Search vendor "Real Time Logic" for product "Mako Server" | >= 2.5 <= 2.6 Search vendor "Real Time Logic" for product "Mako Server" and version " >= 2.5 <= 2.6" | en |
Affected
|