CVE-2026-30809
Published: 13 April 2026
Description
Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command Injection via WebServerModuleDebug. This issue affects Pandora FMS: from 777 through 800
Mitigating Controls (NIST 800-53 r5)AI
Directly requires information input validation at entry points like WebServerModuleDebug to neutralize special elements and prevent OS command injection (CWE-78).
Mandates timely flaw remediation through patching of the specific vulnerability in Pandora FMS versions 777-800, as documented in vendor advisories.
Enforces least privilege for low-privileged authenticated users, limiting the scope and impact of arbitrary OS command execution post-exploitation.
Security SummaryAI
CVE-2026-30809 is an improper neutralization of special elements used in an OS command vulnerability (CWE-78) that enables OS command injection through the WebServerModuleDebug component. Published on 2026-04-13, it affects Pandora FMS versions from 777 through 800 and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability.
The vulnerability can be exploited by low-privileged authenticated users over the network with low complexity and no user interaction required. Successful exploitation allows attackers to inject arbitrary OS commands via the WebServerModuleDebug feature, potentially leading to full system compromise, including unauthorized data access, modification, or execution of malicious code on the affected server.
Pandora FMS has documented this issue in their security advisories, available at https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/, where practitioners can find details on patches and mitigation steps for affected versions.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in web component exploitable by low-priv authenticated users over network enables exploitation of public-facing app (T1190), Unix shell execution (T1059.004 assuming Linux server), and priv esc to full compromise (T1068).