CVE-2025-5965 Overview
CVE-2025-5965 is an OS Command Injection vulnerability affecting Centreon Infra Monitoring. The vulnerability exists in the backup configuration module within the administration setup, where a user with high privileges can concatenate custom instructions to the backup setup parameters. This improper neutralization of special elements used in OS commands (CWE-78) allows authenticated attackers to execute arbitrary operating system commands on the underlying server.
Critical Impact
Authenticated users with administrative privileges can leverage the backup configuration functionality to inject and execute arbitrary OS commands, potentially leading to complete system compromise, data exfiltration, or lateral movement within the network.
Affected Products
- Centreon Infra Monitoring versions 25.10.0 to 25.10.1 (fixed in 25.10.2)
- Centreon Infra Monitoring versions 24.10.0 to 24.10.14 (fixed in 24.10.15)
- Centreon Infra Monitoring versions 24.04.0 to 24.04.18 (fixed in 24.04.19)
Discovery Timeline
- 2026-01-05 - CVE-2025-5965 published to NVD
- 2026-01-08 - Last updated in NVD database
Technical Details for CVE-2025-5965
Vulnerability Analysis
This vulnerability is classified as an OS Command Injection flaw (CWE-78) that arises from insufficient input validation in the backup configuration module of Centreon Infra Monitoring. When administrators configure backup parameters through the administration interface, the application fails to properly sanitize user-supplied input before incorporating it into system commands.
The vulnerability requires authentication with high-level privileges, meaning an attacker must first obtain administrative access to the Centreon web interface. However, once authenticated, the attacker can inject malicious commands that will be executed with the privileges of the web application process, typically running under a service account with elevated filesystem and network access.
The network-based attack vector combined with the ability to achieve full confidentiality, integrity, and availability impact makes this a serious vulnerability for organizations running vulnerable Centreon installations.
Root Cause
The root cause of CVE-2025-5965 lies in improper input validation within the backup configuration functionality. The backup parameters accept user-controlled input that is subsequently passed to operating system command execution functions without adequate sanitization or escaping of shell metacharacters. This allows attackers to break out of the intended command context and append or inject their own commands.
Attack Vector
The attack vector is network-based, requiring authenticated access to the Centreon administration interface. An attacker with administrative credentials can navigate to the backup configuration settings within the administration setup modules. By manipulating the backup parameters with specially crafted input containing shell metacharacters (such as ;, |, &&, or backticks), the attacker can concatenate arbitrary commands to the legitimate backup operations.
The injected commands execute in the context of the web server process, which typically has sufficient privileges to access sensitive configuration files, establish network connections, and potentially pivot to other systems within the monitored infrastructure.
Detection Methods for CVE-2025-5965
Indicators of Compromise
- Unusual process spawning from the Centreon web application or PHP processes
- Unexpected outbound network connections from the Centreon server
- Suspicious entries in backup configuration parameters containing shell metacharacters
- Anomalous command execution patterns in system audit logs originating from web service accounts
Detection Strategies
- Monitor web application logs for requests to backup configuration endpoints with unusual or malformed parameters
- Implement file integrity monitoring on Centreon configuration files and backup scripts
- Deploy endpoint detection rules to alert on command injection patterns executed by web server processes
- Review authentication logs for privileged account activity targeting administration modules
Monitoring Recommendations
- Enable detailed audit logging for the Centreon administration interface
- Configure SIEM rules to correlate administrative access with subsequent system command execution
- Implement behavioral analysis to detect anomalous backup configuration changes
- Monitor for process chains where web server processes spawn unexpected child processes
How to Mitigate CVE-2025-5965
Immediate Actions Required
- Upgrade Centreon Infra Monitoring to patched versions: 25.10.2, 24.10.15, or 24.04.19 respectively
- Review administrative user accounts and remove unnecessary high-privilege access
- Audit backup configuration settings for any suspicious or unauthorized modifications
- Implement network segmentation to limit the blast radius of potential compromise
Patch Information
Centreon has released security updates addressing this vulnerability. Organizations should upgrade to the following fixed versions based on their current deployment:
- Version 25.10.x: Upgrade to 25.10.2 or later
- Version 24.10.x: Upgrade to 24.10.15 or later
- Version 24.04.x: Upgrade to 24.04.19 or later
For detailed release information, refer to the GitHub Centreon Release Notes and the official Centreon Security Bulletin for CVE-2025-5965.
Workarounds
- Restrict access to the Centreon administration interface to trusted IP addresses only
- Implement additional authentication controls such as multi-factor authentication for administrative accounts
- Disable or restrict the backup configuration functionality if not actively required
- Deploy a web application firewall (WAF) with rules to detect command injection attempts
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

