CVE-2025-36846

CRITICAL

CVSS v3

9.8

CRITICAL

EPSS Score

50.1%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.

Technical Details

CVSS v3 Vector
3.1
Published
7/21/2025
Last Modified
9/12/2025

Frequently Asked Questions

What is CVE-2025-36846?

An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.

Is CVE-2025-36846 actively exploited?

Active exploitation of CVE-2025-36846 has not been confirmed. The EPSS score is 50.1%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-36846?

CVE-2025-36846 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.

Is CVE-2025-36846 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.