CVE-2025-5306

9.8 CRITICAL

📋 TL;DR

CVE-2025-5306 is a command injection vulnerability in Pandora FMS that allows attackers to execute arbitrary operating system commands by manipulating the Netflow directory field. This affects Pandora FMS versions 774 through 778. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Pandora FMS
Versions: 774 through 778
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with Netflow functionality enabled are vulnerable. The vulnerability exists in the directory parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root/administrator privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated remote code execution leading to web shell installation, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on CVSS 9.8 score and CWE-77 classification, exploitation is likely straightforward once details become public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 779 or later

Vendor Advisory: https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/

Restart Required: Yes

Instructions:

1. Backup your Pandora FMS configuration and database. 2. Download version 779 or later from the official Pandora FMS website. 3. Follow the upgrade instructions in the Pandora FMS documentation. 4. Restart all Pandora FMS services.

🔧 Temporary Workarounds

Disable Netflow Module

all

Temporarily disable the vulnerable Netflow functionality until patching can be completed.

Edit Pandora FMS configuration to disable Netflow collection

Web Application Firewall Rules

all

Implement WAF rules to block suspicious directory parameter patterns.

Add rule to block requests containing shell metacharacters in directory parameter

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Pandora FMS servers from critical systems
  • Apply strict input validation at the network perimeter using WAF or reverse proxy

🔍 How to Verify

Check if Vulnerable:

Check Pandora FMS version via web interface or configuration files. Versions 774-778 are vulnerable.

Check Version:

grep version /usr/share/pandora_server/pandora_server.conf (Linux) or check web interface About page

Verify Fix Applied:

Verify version is 779 or later and test Netflow functionality for proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Suspicious directory paths in Pandora FMS logs
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Unexpected outbound connections from Pandora FMS server
  • Traffic patterns indicating command and control communication

SIEM Query:

source="pandora_fms" AND (directory="*;*" OR directory="*|*" OR directory="*`*" OR directory="*$(*" OR directory="*&*" OR directory="*>" OR directory="*<*")

🔗 References

📤 Share & Export