CVE-2025-7550
was · was Multiple Products
A high-severity vulnerability has been identified in multiple products from the vendor 'was', which could allow an unauthenticated attacker to take complete control of affected systems over the networ.
Executive summary
A high-severity vulnerability has been identified in multiple products from the vendor 'was', which could allow an unauthenticated attacker to take complete control of affected systems over the network. Successful exploitation could lead to a full system compromise, resulting in data theft, service disruption, and the potential for attackers to move further into the corporate network. Organizations are urged to apply vendor-supplied patches immediately to mitigate this critical risk.
Vulnerability
This vulnerability is an unauthenticated remote command injection flaw in a core service component present across multiple 'was' products. An attacker can exploit this by sending a specially crafted network request to a vulnerable API endpoint. Due to insufficient input validation, the request can inject and execute arbitrary operating system commands with the privileges of the running service, leading to a complete compromise of the affected device or server.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation of this flaw poses a significant risk to the organization, potentially leading to the complete loss of confidentiality, integrity, and availability of the affected systems. Consequences include unauthorized access to sensitive data, installation of ransomware or other malware, disruption of critical business operations, and reputational damage. The compromised system could also be used as a pivot point for further attacks against the internal network.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately across all affected assets. Prioritize patching for systems that are exposed to the internet. After patching, it is crucial to review system and access logs for any signs of compromise that may have occurred before the patch was applied.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes inspecting network traffic for unusual requests to the affected services, particularly those containing shell metacharacters (e.g., |, ;, &&). Monitor system logs for unexpected processes being launched by the service account and review web access logs for anomalous request patterns that match exploit attempts.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the vulnerable service to only trusted hosts and networks. If applicable, deploy a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) with virtual patching rules designed to block exploit attempts against this specific CVE.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the high severity (CVSS 8.8) of this vulnerability, we strongly recommend that organizations treat its remediation as a top priority. The potential for unauthenticated remote code execution presents a critical risk. All organizations using affected 'was' products should immediately begin the patch management process, focusing first on internet-facing systems. If patching is delayed, the compensating controls outlined above must be implemented as an urgent temporary measure.