CVE-2025-5952

7.3 HIGH

📋 TL;DR

This critical vulnerability in Zend.To allows remote attackers to execute arbitrary operating system commands through command injection in the exec function of NSSDropoff.php. It affects Zend.To versions up to 6.10-6 Beta, potentially compromising the entire server. Organizations running vulnerable versions are at risk of complete system takeover.

💻 Affected Systems

Products:
  • Zend.To
Versions: All versions up to and including 6.10-6 Beta
Operating Systems: All platforms running Zend.To
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the NSSDropoff.php file which is part of the file dropoff functionality. All installations using vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to execute arbitrary commands as the web server user, install malware, pivot to other systems, and exfiltrate sensitive data.

🟠

Likely Case

Remote code execution leading to web shell installation, data theft, and potential ransomware deployment on affected systems.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege, and monitoring are in place, though command injection could still allow local privilege escalation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making weaponization likely. The vulnerability requires manipulation of the file_1 parameter in NSSDropoff.php.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.10-7 (minimum), 6.15-8 (recommended with additional countermeasures)

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Backup current Zend.To installation and configuration. 2. Download latest version from official vendor source. 3. Follow vendor upgrade instructions for your specific version. 4. Verify NSSDropoff.php has been updated. 5. Test file dropoff functionality.

🔧 Temporary Workarounds

Disable NSSDropoff.php

linux

Temporarily disable the vulnerable file to prevent exploitation while planning upgrade

mv /path/to/zendto/NSSDropoff.php /path/to/zendto/NSSDropoff.php.disabled

Web Application Firewall Rule

all

Block malicious requests targeting the file_1 parameter in NSSDropoff.php

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zend.To server from critical systems
  • Deploy web application firewall with rules to block command injection patterns in file_1 parameter

🔍 How to Verify

Check if Vulnerable:

Check Zend.To version in admin interface or examine NSSDropoff.php file for vulnerable code patterns

Check Version:

Check Zend.To admin dashboard or examine version files in installation directory

Verify Fix Applied:

Verify version is 6.10-7 or higher, and test that command injection attempts via file_1 parameter are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to NSSDropoff.php with shell metacharacters in file_1 parameter
  • Unexpected process execution from web server user
  • Failed command injection attempts in web logs

Network Indicators:

  • Outbound connections from web server to suspicious IPs
  • Unusual traffic patterns from Zend.To server

SIEM Query:

source="web_logs" AND uri="/NSSDropoff.php" AND (param="file_1" AND value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export