CVE-2025-65480 Overview
CVE-2025-65480 is a Command Injection vulnerability discovered in Pacom Unison Client version 5.13.1. Authenticated users can inject malicious scripts into Report Templates, which are then executed when certain script conditions are fulfilled. This vulnerability enables Remote Code Execution (RCE), allowing attackers with valid credentials to execute arbitrary commands on affected systems.
Critical Impact
Authenticated attackers can achieve Remote Code Execution through malicious script injection in Report Templates, potentially compromising system confidentiality, integrity, and availability.
Affected Products
- Pacom Unison Client 5.13.1
Discovery Timeline
- 2026-02-11 - CVE-2025-65480 published to NVD
- 2026-02-12 - Last updated in NVD database
Technical Details for CVE-2025-65480
Vulnerability Analysis
This vulnerability is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command), commonly known as OS Command Injection. The flaw exists in the Report Templates functionality of Pacom Unison Client, where user-supplied input is not properly sanitized before being passed to the underlying operating system for execution.
The attack requires authentication, meaning an attacker must first obtain valid credentials to access the system. Once authenticated, the attacker can craft malicious scripts within Report Templates. When specific script conditions are met during report generation or processing, the injected commands are executed with the privileges of the application process.
The network-based attack vector with low complexity makes this vulnerability particularly concerning for organizations using Pacom Unison Client in networked environments. Successful exploitation can lead to complete compromise of the affected system, including unauthorized access to sensitive data, modification of system configurations, and disruption of services.
Root Cause
The root cause of this vulnerability lies in insufficient input validation and sanitization within the Report Templates feature. The application fails to properly neutralize special characters and command sequences before incorporating user-controlled data into system commands. This allows attackers to break out of the intended context and inject arbitrary OS commands that are subsequently executed by the system shell.
Attack Vector
The attack leverages the Report Templates functionality as an injection point. An authenticated attacker constructs a malicious script payload and embeds it within a Report Template. The vulnerability is triggered when the application processes the template under specific conditions, causing the injected commands to be interpreted and executed by the underlying operating system.
The exploitation chain typically involves:
- Authenticating to the Pacom Unison Client with valid credentials
- Navigating to the Report Templates functionality
- Creating or modifying a template with embedded malicious script content
- Triggering the conditions that cause the template scripts to execute
- Achieving arbitrary command execution on the target system
For detailed technical analysis and proof-of-concept information, refer to the GitHub CVE-2025-65480 Research repository.
Detection Methods for CVE-2025-65480
Indicators of Compromise
- Unexpected or unauthorized modifications to Report Templates within Pacom Unison Client
- Unusual process spawning from the Pacom Unison Client application process
- Anomalous system commands or shell activity correlated with report generation events
- Authentication logs showing access patterns consistent with exploitation attempts
Detection Strategies
- Monitor Report Template creation and modification events for suspicious script content or command injection patterns
- Implement application-level logging to capture template processing activities and flag unusual script execution
- Deploy endpoint detection solutions to identify command injection attack signatures and anomalous process behavior
- Review audit logs for unauthorized template modifications by authenticated users
Monitoring Recommendations
- Enable verbose logging for the Pacom Unison Client application to capture Report Template activities
- Configure SIEM rules to alert on potential command injection patterns within application logs
- Monitor for unexpected child processes spawned by the Pacom Unison Client executable
- Implement file integrity monitoring on Report Template storage locations
How to Mitigate CVE-2025-65480
Immediate Actions Required
- Review and audit all existing Report Templates for suspicious or unauthorized script content
- Restrict Report Template creation and modification permissions to trusted administrators only
- Implement network segmentation to limit exposure of systems running Pacom Unison Client
- Monitor for exploitation attempts using the detection strategies outlined above
Patch Information
Organizations should contact Pacom directly for information regarding security patches and updated versions that address this vulnerability. Visit the Pacom Official Website for vendor support and security advisories.
Workarounds
- Disable or restrict access to the Report Templates functionality until a patch is available
- Implement strict access controls to limit which users can create or modify Report Templates
- Deploy Web Application Firewall (WAF) or similar filtering solutions to detect and block command injection payloads
- Consider implementing additional input validation at the network perimeter level
# Example: Restrict Report Template permissions (adjust based on your environment)
# Limit template directory access to administrators only
chmod 700 /path/to/pacom/report-templates/
chown admin:admin /path/to/pacom/report-templates/
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


