CVE-2025-70093

An issue in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code via returning a crafted AJAX response.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensourcepos:open_source_point_of_sale:3.4.1:*:*:*:*:*:*:*

History

17 Feb 2026, 14:59

Type Values Removed Values Added
CPE cpe:2.3:a:opensourcepos:open_source_point_of_sale:3.4.1:*:*:*:*:*:*:*
First Time Opensourcepos
Opensourcepos open Source Point Of Sale
References () https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70093.md - () https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70093.md - Exploit, Mitigation, Third Party Advisory
References () https://github.com/opensourcepos/opensourcepos/pull/4357 - () https://github.com/opensourcepos/opensourcepos/pull/4357 - Issue Tracking
References () https://www.opensourcepos.org - () https://www.opensourcepos.org - Product

13 Feb 2026, 22:16

Type Values Removed Values Added
CWE CWE-77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4

13 Feb 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 16:16

Updated : 2026-02-17 14:59


NVD link : CVE-2025-70093

Mitre link : CVE-2025-70093

CVE.ORG link : CVE-2025-70093


JSON object : View

Products Affected

opensourcepos

  • open_source_point_of_sale
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')