Vulnerability Description
The Telenium Online Web Application is vulnerable due to a PHP endpoint accessible to unauthenticated network users that improperly handles user-supplied input. This vulnerability occurs due to the insecure termination of a regular expression check within the endpoint. Because the input is not correctly validated or sanitized, an unauthenticated attacker can inject arbitrary operating system commands through a crafted HTTP request, leading to remote code execution on the server in the context of the web application service account.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-10659?
CVE-2025-10659 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Telenium Online Web Application is vulnerable due to a PHP endpoint accessible to unauthenticated network users that improperly handles user-supplied input. This vulnerability occurs due to the in...
How severe is CVE-2025-10659?
CVE-2025-10659 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-10659?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.