Sites running NOAA PMEL Live Access Server (LAS) are vulnerable to remote code execution via specially crafted requests that include PyFerret expressions. By leveraging a SPAWN command, a remote, unauthenticated attacker can execute arbitrary OS commands. Fixed in a version of 'gov.noaa.pmel.tmap.las.filter.RequestInputFilter.java' from 2025-09-24.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62193.json"
[
{
"signature_type": "Function",
"source": "https://github.com/noaa-pmel/las/commit/e69afb1898ae7e69f3e047513fc1e5570373912b",
"id": "CVE-2025-62193-3935a9d6",
"deprecated": false,
"target": {
"function": "doFilter",
"file": "JavaSource/gov/noaa/pmel/tmap/las/filter/RequestInputFilter.java"
},
"signature_version": "v1",
"digest": {
"length": 4087.0,
"function_hash": "264110938858644081626382572019043999149"
}
},
{
"signature_type": "Line",
"source": "https://github.com/noaa-pmel/las/commit/e69afb1898ae7e69f3e047513fc1e5570373912b",
"id": "CVE-2025-62193-e3279f0f",
"deprecated": false,
"target": {
"file": "JavaSource/gov/noaa/pmel/tmap/las/filter/RequestInputFilter.java"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"126588383116845988257679067461954675817",
"154712059936506012146224492420687922825",
"311868067122082723401555757768005117980",
"121054533333909547447367334020681889490"
],
"threshold": 0.9
}
}
]