CVE-2025-34079

HIGH

CVSS v3

7.8

HIGH

EPSS Score

73.1%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remot

Technical Details

CVSS v3 Vector
3.1
Published
7/2/2025
Last Modified
9/16/2025

Frequently Asked Questions

What is CVE-2025-34079?

An authenticated remote code execution vulnerability exists in NSClient++ version 0.5.2.35 when the web interface and ExternalScripts module are enabled. A remote attacker with the administrator password can authenticate to the web interface (default port 8443), inject arbitrary commands as external scripts via the /settings/query.json API, save the configuration, and trigger the script via the /query/{name} endpoint. The injected commands are executed with SYSTEM privileges, enabling full remot

Is CVE-2025-34079 actively exploited?

Active exploitation of CVE-2025-34079 has not been confirmed. The EPSS score is 73.1%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-34079?

CVE-2025-34079 has a CVSS v3 base score of 7.8 (HIGH severity), with vector string 3.1.

Is CVE-2025-34079 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.