CVE-2025-54123
Scores
EPSS
Percentile: 62.9%
CVSS
CVSS Score: 9.8/10
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector Breakdown
CVSS (Common Vulnerability Scoring System) vector provides detailed metrics about vulnerability characteristics
CVSS
Attack Vector
Network (N)
Describes how the vulnerability is exploited
Attack Complexity
Low (L)
Describes the conditions beyond the attacker's control
Privileges Required
None (N)
Describes the level of privileges an attacker must possess
User Interaction
None (N)
Captures the requirement for a human user participation
Scope
Unchanged (U)
Determines if a successful attack impacts components beyond the vulnerable component
Confidentiality Impact
High (H)
Measures the impact to the confidentiality of information
Integrity Impact
High (H)
Measures the impact to integrity of a successfully exploited vulnerability
Availability Impact
High (H)
Measures the impact to the availability of the impacted component
Description
Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, the middleware functionality in Hoverfly is vulnerable to command injection vulnerability at /api/v2/hoverfly/middleware endpoint due to insufficient validation and sanitization in user input. The vulnerability exists in the middleware management API endpoint /api/v2/hoverfly/middleware. This issue is born due to combination of three code level flaws: Insufficient Input Validation in middleware.go line 94-96; Unsafe Command Execution in local_middleware.go line 14-19; and Immediate Execution During Testing in hoverfly_service.go line 173. This allows an attacker to gain remote code execution (RCE) on any system running the vulnerable Hoverfly service. Since the input is directly passed to system commands without proper checks, an attacker can upload a malicious payload or directly execute arbitrary commands (including reverse shells) on the host server with the privileges of the Hoverfly process. Commit 17e60a9bc78826deb4b782dca1c1abd3dbe60d40 in version 1.12.0 disables the set middleware API by default, and subsequent changes to documentation make users aware of the security changes of exposing the set middleware API.
Scaner-VS 7 — a modern vulnerability management solution
Sources
CWEs
Exploits
Vulnerable Software (2)
Type: Configuration
Operating System:
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:a:hoverfly:hoverfly:*:*:*:*:*:go:*:*", "versionEndExcluding": "1.12.0" } ], "negate"...
{ "children": [ { "cpe_match": [ { "cpe23uri": "cpe:2.3:a:hoverfly:hoverfly:*:*:*:*:*:go:*:*", "versionEndExcluding": "1.12.0" } ], "negate": false, "operator": "OR" } ], "operator": "OR"}
Source: anchore_overrides
Type: Configuration
Vendor: *
Product: hoverfly
Operating System: * * *
{ "cpe_match": [ { "cpe23uri": "cpe:2.3:a:hoverfly:hoverfly:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.12.0", "vulnerable": true } ], "operator": "OR"}
Source: nvd