CVE-2025-32778

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32778
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-32778.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-32778
Aliases
  • GHSA-5qg5-g7c2-pfx8
Published
2025-04-15T21:16:04Z
Modified
2025-04-16T14:55:44.041476Z
Summary
[none]
Details

Web-Check is an all-in-one OSINT tool for analyzing any website. A command injection vulnerability exists in the screenshot API of the Web Check project (Lissy93/web-check). The issue stems from user-controlled input (url) being passed unsanitized into a shell command using exec(), allowing attackers to execute arbitrary system commands on the underlying host. This could be exploited by sending crafted url parameters to extract files or even establish remote access. The vulnerability has been patched by replacing exec() with execFile(), which avoids using a shell and properly isolates arguments.

References

Affected packages

Git / github.com/lissy93/web-check

Affected ranges

Type
GIT
Repo
https://github.com/lissy93/web-check
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0