A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation
Metrics
Affected Vendors & Products
References
History
Wed, 04 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ccurtsinger
Ccurtsinger stabilizer |
|
| Vendors & Products |
Ccurtsinger
Ccurtsinger stabilizer |
Tue, 03 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Tue, 03 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-03-03T00:00:00.000Z
Updated: 2026-03-03T15:40:44.291Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-52365
Updated: 2026-03-03T15:39:56.324Z
Status : Awaiting Analysis
Published: 2026-03-03T15:16:15.263
Modified: 2026-03-03T21:52:29.877
Link: CVE-2025-52365
No data.