CVE-2025-34102

| EUVD-2025-21029 CRITICAL
2025-07-10 [email protected]
9.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-21029
PoC Detected
Jul 15, 2025 - 13:14 vuln.today
Public exploit code
CVE Published
Jul 10, 2025 - 20:15 nvd
CRITICAL 9.3

Description

A remote code execution vulnerability exists in CryptoLog (PHP version, discontinued since 2009) due to a chained exploitation of SQL injection and command injection vulnerabilities. An unauthenticated attacker can gain shell access as the web server user by first exploiting a SQL injection flaw in login.php to bypass authentication, followed by command injection in logshares_ajax.php to execute arbitrary operating system commands. The login bypass is achieved by submitting crafted SQL via the user POST parameter. Once authenticated, the attacker can abuse the lsid POST parameter in the logshares_ajax.php endpoint to inject and execute a command using $(...) syntax, resulting in code execution under the web context. This exploitation path does not exist in the ASP.NET version of CryptoLog released since 2009.

Analysis

CryptoLog PHP edition (discontinued since 2009) contains a chained SQL injection and command injection vulnerability. An unauthenticated attacker can first bypass authentication via SQLi in login.php, then exploit command injection to gain shell access as the web server user.

Technical Context

The login.php script is vulnerable to SQL injection allowing authentication bypass. Once authenticated, additional endpoints contain command injection vulnerabilities that execute OS commands. The chain provides unauthenticated RCE on systems running this discontinued application.

Affected Products

['CryptoLog (PHP version, discontinued)']

Remediation

Remove CryptoLog from production systems immediately as it is abandoned software with no security updates available.

Priority Score

127
Low Medium High Critical
KEV: 0
EPSS: +60.0
CVSS: +46
POC: +20

Share

CVE-2025-34102 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy