CVE-2025-50688

A command injection vulnerability exists in TwistedWeb (version 14.0.0) due to improper input sanitization in the file upload functionality. An attacker can exploit this vulnerability by sending a specially crafted HTTP PUT request to upload a malicious file (e.g., a reverse shell script). Once uploaded, the attacker can trigger the execution of arbitrary commands on the target system, allowing for remote code execution. This could lead to escalation of privileges depending on the privileges of the web server process. The attack does not require physical access and can be conducted remotely, posing a significant risk to the confidentiality and integrity of the system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:twistedmatrix:twistedweb:14.0.0:*:*:*:*:*:*:*

History

06 Nov 2025, 18:35

Type Values Removed Values Added
First Time Twistedmatrix
Twistedmatrix twistedweb
CPE cpe:2.3:a:twistedmatrix:twistedweb:14.0.0:*:*:*:*:*:*:*
References () https://medium.com/@Justinsecure/chained-rce-on-twistedweb-14-0-0-via-command-injection-and-unauthenticated-put-1aa657995b4e - () https://medium.com/@Justinsecure/chained-rce-on-twistedweb-14-0-0-via-command-injection-and-unauthenticated-put-1aa657995b4e - Exploit, Third Party Advisory
References () https://twisted.org/documents/14.0.0/index.html - () https://twisted.org/documents/14.0.0/index.html - Product

Information

Published : 2025-08-05 18:15

Updated : 2025-11-06 18:35


NVD link : CVE-2025-50688

Mitre link : CVE-2025-50688

CVE.ORG link : CVE-2025-50688


JSON object : View

Products Affected

twistedmatrix

  • twistedweb
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')