We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An OS command injection vulnerability exists in Mako Server versions 2.5 and 2.6, specifically within the tutorial interface provided by the examples/save.lsp endpoint. An unauthenticated attacker can send a crafted PUT request containing arbitrary Lua os.execute() code, which is then persisted on disk and triggered via a subsequent GET request to examples/manage.lsp. This allows remote command execution on the underlying operating system, impacting both Windows and Unix-based deployments.
Reserved 2025-04-15 | Published 2025-07-10 | Updated 2025-07-11 | Assigner VulnCheckCWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
John Page (hyp3rlinx) of Beyond Security SecuriTeam Secure Disclosure
raw.githubusercontent.com/...lti/http/makoserver_cmd_exec.rb
www.exploit-db.com/exploits/43132
vulncheck/advisories/mako-server-rce
Support options