{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T11:49:37.190","vulnerabilities":[{"cve":{"id":"CVE-2025-54123","sourceIdentifier":"security-advisories@github.com","published":"2025-09-10T19:15:41.803","lastModified":"2025-09-17T21:17:53.460","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Hoverfly is an open source API simulation tool. In versions 1.11.3 and prior, the middleware functionality in Hoverfly is vulnerable to command injection vulnerability at `/api/v2/hoverfly/middleware` endpoint due to insufficient validation and sanitization in user input. The vulnerability exists in the middleware management API endpoint `/api/v2/hoverfly/middleware`. This issue is born due to combination of three code level flaws: Insufficient Input Validation in middleware.go line 94-96; Unsafe Command Execution in local_middleware.go line 14-19; and Immediate Execution During Testing in hoverfly_service.go line 173. This allows an attacker to gain remote code execution (RCE) on any system running the vulnerable Hoverfly service. Since the input is directly passed to system commands without proper checks, an attacker can upload a malicious payload or directly execute arbitrary commands (including reverse shells) on the host server with the privileges of the Hoverfly process. Commit 17e60a9bc78826deb4b782dca1c1abd3dbe60d40 in version 1.12.0 disables the set middleware API by default, and subsequent changes to documentation make users aware of the security changes of exposing the set middleware API."},{"lang":"es","value":"Hoverfly es una herramienta de simulación de API de código abierto. En las versiones 1.11.3 y anteriores, la funcionalidad de middleware en Hoverfly es vulnerable a una vulnerabilidad de inyección de comandos en el endpoint '/api/v2/hoverfly/middleware' debido a una validación y sanitización insuficientes en la entrada del usuario. La vulnerabilidad existe en el endpoint de la API de gestión de middleware '/api/v2/hoverfly/middleware'. Este problema nace de la combinación de tres fallos a nivel de código: Validación de Entrada Insuficiente en middleware.go línea 94-96; Ejecución de Comandos Insegura en local_middleware.go línea 14-19; y Ejecución Inmediata Durante las Pruebas en hoverfly_service.go línea 173. Esto permite a un atacante obtener ejecución remota de código (RCE) en cualquier sistema que ejecute el servicio Hoverfly vulnerable. Dado que la entrada se pasa directamente a los comandos del sistema sin las comprobaciones adecuadas, un atacante puede cargar una carga útil maliciosa o ejecutar directamente comandos arbitrarios (incluyendo shells inversas) en el servidor anfitrión con los privilegios del proceso Hoverfly. El commit 17e60a9bc78826deb4b782dca1c1abd3dbe60d40 en la versión 1.12.0 deshabilita la API de configuración de middleware por defecto, y los cambios posteriores en la documentación alertan a los usuarios sobre los cambios de seguridad al exponer la API de configuración de middleware."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hoverfly:hoverfly:*:*:*:*:*:*:*:*","versionEndExcluding":"1.12.0","matchCriteriaId":"52876127-6BCA-42D6-9133-2A7A0B326DE8"}]}]}],"references":[{"url":"https://github.com/SpectoLabs/hoverfly/blob/master/core/hoverfly_service.go#L173","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/SpectoLabs/hoverfly/blob/master/core/middleware/local_middleware.go#L13","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/SpectoLabs/hoverfly/blob/master/core/middleware/middleware.go#L93","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/SpectoLabs/hoverfly/commit/17e60a9bc78826deb4b782dca1c1abd3dbe60d40","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/SpectoLabs/hoverfly/commit/a9d4da7bd7269651f54542ab790d0c613d568d3e","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/SpectoLabs/hoverfly/security/advisories/GHSA-r4h8-hfp2-ggmf","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/SpectoLabs/hoverfly/security/advisories/GHSA-r4h8-hfp2-ggmf","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}