CVE-2025-36846
CRITICALCVSS v3
9.8
CRITICAL
EPSS Score
50.1%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 7/21/2025
- Last Modified
- 9/12/2025
Frequently Asked Questions
What is CVE-2025-36846?
An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.
Is CVE-2025-36846 actively exploited?
Active exploitation of CVE-2025-36846 has not been confirmed. The EPSS score is 50.1%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-36846?
CVE-2025-36846 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.
Is CVE-2025-36846 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.