CVE-2025-47773

Combodo · Combodo Multiple Products

A high-severity vulnerability has been discovered in multiple Combodo products, including the widely used iTop IT service management platform.

Executive summary

A high-severity vulnerability has been discovered in multiple Combodo products, including the widely used iTop IT service management platform. Successful exploitation could allow a remote, unauthenticated attacker to execute arbitrary code on the server, potentially leading to a complete system compromise, data theft, and disruption of critical IT services.

Vulnerability

This vulnerability is a critical remote code execution (RCE) flaw resulting from insufficient input validation in a core component of the application. An unauthenticated attacker can send a specially crafted request to a publicly accessible API endpoint. By embedding malicious code within the request, an attacker can trick the server into executing arbitrary commands with the privileges of the web server user, leading to a full compromise of the iTop instance.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have a severe impact on business operations. Since Combodo iTop often acts as a central repository for an organization's IT asset data, incident history, and configuration details, an attacker could access, modify, or exfiltrate this sensitive information. The ability to execute code on the server could also allow an attacker to establish a persistent foothold in the network, pivot to other internal systems, disrupt essential IT services managed through iTop, and cause significant operational and reputational damage.

Remediation

Immediate Action: Organizations must immediately apply the security patches released by Combodo to all affected iTop instances, prioritizing internet-facing systems. After patching, verify that the update was successfully installed and the vulnerability is no longer present.

Proactive Monitoring: Security teams should actively monitor web server and application logs for unusual or malformed requests, particularly those targeting the application's API endpoints. Monitor for suspicious outbound network connections from the iTop server, unexpected processes, or modifications to system files, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, restrict network access to the iTop application to only trusted IP addresses. Deploy a Web Application Firewall (WAF) with rules designed to inspect and block the malicious request patterns associated with this CVE.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high severity (CVSS 8.8) of this remote code execution vulnerability, we strongly recommend that all organizations using the affected Combodo products treat this as a critical priority. Although this vulnerability is not yet listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for unauthenticated remote exploitation makes it an attractive target for attackers. Immediate patching is the most effective mitigation. If patching is delayed, the compensating controls outlined above should be implemented without delay to reduce the attack surface.