OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application contains an input-neutralization flaw in its mail configuration and delivery workflow that allows user-controlled values to flow directly into the system’s sendmail command. Because these values are not sanitized or constrained before being incorporated into the command execution path, certain sendmail behaviors can be unintentionally invoked during email processing. This makes it possible for the application to write files on the server as part of the mail-handling routine, and in deployments where those files end up in web-accessible locations, the behavior can be leveraged to achieve execution of attacker-controlled content. The issue stems entirely from constructing OS-level command strings using unsanitized input within the mail-sending logic. This issue has been patched in version 5.8.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:orangehrm:orangehrm:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 01 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orangehrm
Orangehrm orangehrm |
|
| Vendors & Products |
Orangehrm
Orangehrm orangehrm |
Sat, 29 Nov 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application contains an input-neutralization flaw in its mail configuration and delivery workflow that allows user-controlled values to flow directly into the system’s sendmail command. Because these values are not sanitized or constrained before being incorporated into the command execution path, certain sendmail behaviors can be unintentionally invoked during email processing. This makes it possible for the application to write files on the server as part of the mail-handling routine, and in deployments where those files end up in web-accessible locations, the behavior can be leveraged to achieve execution of attacker-controlled content. The issue stems entirely from constructing OS-level command strings using unsanitized input within the mail-sending logic. This issue has been patched in version 5.8. | |
| Title | OrangeHRM is Vulnerable to Code Execution Through Arbitrary File Write from Sendmail Parameter Injection | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-29T03:04:42.301Z
Updated: 2025-12-01T15:13:29.930Z
Reserved: 2025-11-24T23:01:29.679Z
Link: CVE-2025-66224
Updated: 2025-12-01T15:13:18.001Z
Status : Analyzed
Published: 2025-11-29T04:15:57.497
Modified: 2025-12-03T16:55:22.137
Link: CVE-2025-66224
No data.