CVE-2025-65480

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users of Pacom Unison Client 5.13.1 to inject malicious scripts into Report Templates. When specific script conditions are met, these scripts execute, potentially leading to remote code execution on affected systems. Organizations using this specific version of the software are at risk.

💻 Affected Systems

Products:
  • Pacom Unison Client
Versions: 5.13.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; all installations of version 5.13.1 are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, data exfiltration, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Authenticated attackers execute arbitrary code within the application context, potentially accessing sensitive data, modifying reports, or disrupting operations.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation or containing damage.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of report template scripting; no public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.13.2 or later

Vendor Advisory: http://pacom.com

Restart Required: No

Instructions:

1. Download latest version from Pacom vendor portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Verify successful installation.

🔧 Temporary Workarounds

Restrict Report Template Access

all

Limit which users can create or modify report templates to only trusted administrators.

Input Validation Enhancement

all

Implement additional input validation on report template fields to block script injection attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Unison Client systems from critical assets.
  • Enable detailed logging and monitoring for report template modifications and unusual script execution.

🔍 How to Verify

Check if Vulnerable:

Check installed version in application settings or via 'unison --version' command; version 5.13.1 is vulnerable.

Check Version:

unison --version

Verify Fix Applied:

Confirm version is 5.13.2 or higher; test report template functionality with safe scripts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual report template modifications
  • Script execution errors in application logs
  • Multiple failed authentication attempts followed by template access

Network Indicators:

  • Unexpected outbound connections from Unison Client
  • Unusual data transfers to external IPs

SIEM Query:

source="unison.log" AND (event="template_modified" OR event="script_execution")

🔗 References

📤 Share & Export