{"uuid": "3e74fa77-7b0d-4b18-9696-f8b90a5707ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27364", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5206", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27364\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.\n\ud83d\udccf Published: 2025-02-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-24T19:08:07.220Z\n\ud83d\udd17 References:\n1. https://github.com/mitre/caldera/releases\n2. https://github.com/mitre/caldera/security\n3. https://medium.com/@mitrecaldera/mitre-caldera-security-advisory-remote-code-execution-cve-2025-27364-5f679e2e2a0e\n4. https://github.com/mitre/caldera/commit/35bc06e42e19fe7efbc008999b9f993b1b7109c0\n5. https://github.com/mitre/caldera/pull/3131/commits/61de40f92a595bed462372a5e676c2e5a32d1050\n6. https://github.com/mitre/caldera/pull/3129", "creation_timestamp": "2025-02-24T19:22:20.000000Z"}