An issue in Passy v.1.6.3 allows a remote authenticated attacker to execute arbitrary commands via a crafted HTTP request using a specific payload injection.
References
| Link | Resource |
|---|---|
| https://github.com/giulioschiavone/Vulnerability-Research/tree/main/CVE-2025-67397 | Third Party Advisory |
| https://www.passy.it/ | Product |
Configurations
History
22 Jan 2026, 21:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:passy:passy:1.6.3:*:*:*:*:*:*:* | |
| References | () https://github.com/giulioschiavone/Vulnerability-Research/tree/main/CVE-2025-67397 - Third Party Advisory | |
| References | () https://www.passy.it/ - Product | |
| First Time |
Passy
Passy passy |
06 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| CWE | CWE-77 |
05 Jan 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-05 19:15
Updated : 2026-01-22 21:12
NVD link : CVE-2025-67397
Mitre link : CVE-2025-67397
CVE.ORG link : CVE-2025-67397
JSON object : View
Products Affected
passy
- passy
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
