FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.
History

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Soliton Systems K.k.
Soliton Systems K.k. filezen
Vendors & Products Soliton Systems K.k.
Soliton Systems K.k. filezen

Fri, 13 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description FileZen contains an OS command injection vulnerability. When FileZen virus check option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command. FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

Fri, 13 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description FileZen contains an OS command injection vulnerability. When FileZen virus check option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-02-13T13:09:17.740Z

Reserved: 2026-01-30T11:03:04.608Z

Link: CVE-2026-25108

cve-icon Vulnrichment

Updated: 2026-02-13T13:08:28.786Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-13T04:15:53.410

Modified: 2026-02-13T14:23:48.007

Link: CVE-2026-25108

cve-icon Redhat

No data.