A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation
References
Configurations
No configuration.
History
27 Apr 2026, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
03 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-77 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
03 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 15:16
Updated : 2026-04-27 19:18
NVD link : CVE-2025-52365
Mitre link : CVE-2025-52365
CVE.ORG link : CVE-2025-52365
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
