{"vulnerability": "CVE-2025-27106", "sightings": [{"uuid": "66fc7881-db6e-41ae-afcc-1e239fd12e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27106", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5043", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27106\n\ud83d\udd25 CVSS Score: 7.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: binance-trading-bot is an automated Binance trading bot with trailing buy/sell strategy. Authenticated users of binance-trading-bot can achieve Remote Code Execution on the host system due to a command injection vulnerability in the `/restore` endpoint. The restore endpoint of binance-trading-bot is vulnerable to command injection via the `/restore` endpoint. The name of the uploaded file is passed to shell.exec without sanitization other than path normalization, resulting in Remote Code Execution. This may allow any authorized user to execute code in the context of the host machine. This issue has been addressed in version 0.0.100 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-02-21T21:18:18.284Z\n\ud83d\udccf Modified: 2025-02-22T15:40:06.071Z\n\ud83d\udd17 References:\n1. https://github.com/chrisleekr/binance-trading-bot/security/advisories/GHSA-wq6j-4388-4gg5\n2. https://github.com/chrisleekr/binance-trading-bot/commit/99d464cf8ef858d441189993054ec5f5f86e6213\n3. https://github.com/chrisleekr/binance-trading-bot/blob/dd8e1a91b872a48aec47bbe1280c1c6ea96784d9/app/frontend/webserver/handlers/restore-post.js#L14", "creation_timestamp": "2025-02-22T16:25:15.000000Z"}, {"uuid": "4cc0abf9-d4b9-4281-bb4f-284821332ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27106", "type": "published-proof-of-concept", "source": "Telegram/z-TEGJuLb-MI9QSBe5sQLLsDPvx9hpDxWNGhFcSyGduHviQ", "content": "", "creation_timestamp": "2025-02-21T23:31:55.000000Z"}, {"uuid": "6a79cd51-3035-4a7d-8bd0-b5015de8a966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27106", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114044196487307845", "content": "", "creation_timestamp": "2025-02-21T22:18:58.763390Z"}, {"uuid": "0f9d97bc-f2dc-4ee4-93b3-30437e53955c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27106", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114048796287261525", "content": "", "creation_timestamp": "2025-02-22T17:48:46.918604Z"}, {"uuid": "9e6d0709-237c-4a56-a48f-8b8736885e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27106", "type": "seen", "source": "https://t.me/cvedetector/18691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27106 - Binance Trading Bot Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27106 \nPublished : Feb. 21, 2025, 10:15 p.m. | 33\u00a0minutes ago \nDescription : binance-trading-bot is an automated Binance trading bot with trailing buy/sell strategy. Authenticated users of binance-trading-bot can achieve Remote Code Execution on the host system due to a command injection vulnerability in the `/restore` endpoint. The restore endpoint of binance-trading-bot is vulnerable to command injection via the `/restore` endpoint. The name of the uploaded file is passed to shell.exec without sanitization other than path normalization, resulting in Remote Code Execution. This may allow any authorized user to execute code in the context of the host machine. This issue has been addressed in version 0.0.100 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-21T23:57:28.000000Z"}]}