Cyber Posture

CVE-2025-67397

Critical

Published: 05 January 2026

Published
05 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0012 29.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

An issue in Passy v.1.6.3 allows a remote authenticated attacker to execute arbitrary commands via a crafted HTTP request using a specific payload injection.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of flaws like this command injection vulnerability through patching Passy to version 1.6.3 or later.

prevent

SI-10 mandates validation of information inputs such as crafted HTTP requests to block arbitrary command injection payloads.

detect

SI-4 enables monitoring of system processes and activities to identify unauthorized command executions from exploitation attempts.

Security SummaryAI

CVE-2025-67397 is a command injection vulnerability (CWE-77) in Passy version 1.6.3. The flaw enables a remote authenticated attacker to execute arbitrary commands by sending a crafted HTTP request that incorporates a specific payload injection.

A remote attacker with high privileges can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation grants high impacts on confidentiality, integrity, and availability, along with a change in scope, resulting in a CVSS v3.1 base score of 9.1.

Research details for CVE-2025-67397, including a proof-of-concept, are published in the GitHub repository at https://github.com/giulioschiavone/Vulnerability-Research/tree/main/CVE-2025-67397. The official Passy website at https://www.passy.it/ provides further information on the software, where users should check for advisories or patches.

Details

CWE(s)

Affected Products

passy
passy
1.6.3

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection via crafted HTTP request in remote service directly enables public-facing application exploitation (T1190) and arbitrary command/script execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References