Cyber Posture

CVE-2025-13284

Critical

Published: 17 November 2025

Published
17 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0053 67.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

ThinPLUS developed by ThinPLUS has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the OS command injection vulnerability in ThinPLUS by identifying, reporting, and correcting the specific flaw through patching.

prevent

Prevents OS command injection by validating all user inputs to ensure they do not contain arbitrary commands before processing.

prevent

Mitigates command injection by restricting inputs to safe formats, lengths, and character sets that block shell metacharacters and payloads.

Security SummaryAI

CVE-2025-13284 is an OS command injection vulnerability (CWE-78) in ThinPLUS software developed by ThinPLUS. Published on 2025-11-17, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability. The flaw allows unauthenticated remote attackers to inject and execute arbitrary operating system commands on the affected server.

Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation enables full remote code execution on the server, potentially granting attackers complete control over the system, including data exfiltration, modification, or disruption of services.

Advisories from the Taiwan CERT Coordination Center (TWCERT/CC) detail the vulnerability at https://www.twcert.org.tw/en/cp-139-10513-0d82b-2.html and https://www.twcert.org.tw/tw/cp-132-10512-e196b-1.html, providing guidance for practitioners on identification and response.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

CVE enables unauthenticated remote exploitation of a public-facing application (T1190) via OS command injection, directly facilitating arbitrary command execution through command interpreters (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References