Atheos is a self-hosted browser-based cloud integrated development environment. Prior to version 6.0.4, improper use of `escapeshellcmd()` in `/components/codegit/traits/execute.php` allows argument injection, leading to arbitrary command execution. Atheos administrators and users of vulnerable versions are at risk of data breaches or server compromise. Version 6.0.4 introduces a `Common::safe_execute` function that sanitizes all arguments using `escapeshellarg()` prior to execution and migrated all components potentially vulnerable to similar exploits to use this new templated execution system.
CVSS
No CVSS.
References
Configurations
No configuration.
History
05 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/Atheos/Atheos/security/advisories/GHSA-rwc2-4q8c-xj48 - |
05 Jun 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-05 01:15
Updated : 2025-06-05 20:12
NVD link : CVE-2025-49008
Mitre link : CVE-2025-49008
CVE.ORG link : CVE-2025-49008
JSON object : View
Products Affected
No product.