CVE-2025-30076

7.7 HIGH

📋 TL;DR

This vulnerability allows authenticated Koha administrators to execute arbitrary commands on the server via shell injection in the scheduler tool. Attackers with admin privileges can exploit this to gain remote code execution. All Koha installations with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Koha
Versions: All versions before 24.11.02
Operating Systems: All platforms running Koha
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication to access the vulnerable scheduler.pl tool

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, ransomware deployment, or complete system takeover

🟠

Likely Case

Privilege escalation leading to unauthorized data access or system manipulation

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place

🌐 Internet-Facing: HIGH if Koha is exposed to the internet with admin accounts accessible
🏢 Internal Only: HIGH as authenticated admins can exploit this from internal networks

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin credentials but is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.11.02 or later

Vendor Advisory: https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=39170

Restart Required: No

Instructions:

1. Backup your Koha installation and database. 2. Update to Koha 24.11.02 or later. 3. Verify the patch is applied by checking the scheduler.pl file.

🔧 Temporary Workarounds

Restrict scheduler.pl access

all

Temporarily restrict access to the vulnerable scheduler.pl tool

chmod 000 /path/to/koha/tools/scheduler.pl

Remove scheduler.pl

all

Temporarily remove or rename the vulnerable file

mv /path/to/koha/tools/scheduler.pl /path/to/koha/tools/scheduler.pl.disabled

🧯 If You Can't Patch

  • Implement strict access controls to limit admin account usage
  • Monitor and audit all admin activities on the Koha system

🔍 How to Verify

Check if Vulnerable:

Check Koha version: if below 24.11.02, system is vulnerable

Check Version:

koha-version

Verify Fix Applied:

Verify Koha version is 24.11.02 or later and scheduler.pl has been updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Suspicious scheduler.pl usage by admin accounts

Network Indicators:

  • Unexpected outbound connections from Koha server

SIEM Query:

source="koha" AND (process="scheduler.pl" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export