A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release. Additional countermeasures have been added in 6.15-8.
                
            References
                    Configurations
                    No configuration.
History
                    10 Jun 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
|
| Summary | (en) A vulnerability, which was classified as critical, has been found in Zend.To up to 6.10-6 Beta. This issue affects the function exec of the file NSSDropoff.php. The manipulation of the argument file_1 leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.10-7 is able to address this issue. It is recommended to upgrade the affected component. This affects a rather old version of the software. The vendor recommends updating to the latest release. Additional countermeasures have been added in 6.15-8. | 
10 Jun 2025, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-06-10 05:15
Updated : 2025-06-12 16:06
NVD link : CVE-2025-5952
Mitre link : CVE-2025-5952
CVE.ORG link : CVE-2025-5952
JSON object : View
Products Affected
                No product.
