CVE-2025-10097
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on SimStudioAI sim servers by injecting malicious code through the 'code' parameter in the execute route API. It affects all users running SimStudioAI sim version 1.0.0 or earlier. The vulnerability is remotely exploitable without authentication.
💻 Affected Systems
- SimStudioAI sim
📦 What is this software?
Sim by Sim
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, install malware, or pivot to other systems in the network.
Likely Case
Unauthorized code execution leading to data exfiltration, service disruption, or installation of backdoors for persistent access.
If Mitigated
Limited impact with proper input validation and execution sandboxing, potentially resulting in failed exploitation attempts.
🎯 Exploit Status
Remote exploitation requires no authentication and involves simple code injection via API parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.0.0
Vendor Advisory: https://github.com/simstudioai/sim/issues/961
Restart Required: No
Instructions:
1. Update SimStudioAI sim to the latest version. 2. Verify the patch is applied by checking the version. 3. No restart required for typical deployments.
🔧 Temporary Workarounds
Input Validation Filter
allImplement strict input validation to reject malicious code patterns in the 'code' parameter.
API Endpoint Restriction
allRestrict access to the vulnerable API endpoint using network controls or authentication.
🧯 If You Can't Patch
- Implement Web Application Firewall (WAF) rules to block code injection patterns
- Isolate the vulnerable system in a restricted network segment
🔍 How to Verify
Check if Vulnerable:
Check if running SimStudioAI sim version 1.0.0 or earlier and verify the execute route API endpoint is accessible.
Check Version:
Check package.json or application configuration for version information
Verify Fix Applied:
Confirm the application version is updated beyond 1.0.0 and test the API endpoint with safe test inputs.
📡 Detection & Monitoring
Log Indicators:
- Unusual code execution patterns in API logs
- Multiple failed injection attempts
- Suspicious payloads in 'code' parameter
Network Indicators:
- Unusual outbound connections from the application server
- Traffic patterns indicating code execution
SIEM Query:
source="simstudioai" AND (message="execute" OR message="code") AND (message="injection" OR message="malicious")
🔗 References
- https://github.com/simstudioai/sim/issues/961
- https://github.com/simstudioai/sim/issues/961#issuecomment-3215578979
- https://vuldb.com/?ctiid.323058
- https://vuldb.com/?id.323058
- https://vuldb.com/?submit.644954
- https://github.com/simstudioai/sim/issues/961
- https://github.com/simstudioai/sim/issues/961#issuecomment-3215578979