{ "schema_version": "1.4.0", "id": "GHSA-82jh-rv5v-x9x9", "modified": "2025-09-10T15:31:16Z", "published": "2025-09-09T21:30:31Z", "aliases": [ "CVE-2025-57633" ], "details": "A command injection vulnerability in FTP-Flask-python through 5173b68 allows unauthenticated remote attackers to execute arbitrary OS commands. The /ftp.html endpoint's \"Upload File\" action constructs a shell command from the ftp_file parameter and executes it using os.system() without sanitization or escaping.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57633" }, { "type": "WEB", "url": "https://gist.github.com/Spendroslav/1c0c6a6556992291b19c3178e3cb5885" }, { "type": "WEB", "url": "https://github.com/ajaypp123/FTP-Flask-python/blob/5173b6828244ff9729fa29cc144d74ccbea30a73/ftp_app.py" } ], "database_specific": { "cwe_ids": [ "CWE-77" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-09T21:15:38Z" } }