This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: CVE-2025-54123 is a **Command Injection** flaw in Hoverfly. π₯ **Consequences**: Unauthenticated attackers can achieve **Remote Code Execution (RCE)** on the host system.β¦
π‘οΈ **Root Cause**: **CWE-20 (Improper Input Validation)**. The middleware API endpoint (`/api/v2/hoverfly/middleware`) fails to sanitize the `binary` and `script` parameters.β¦
π¦ **Affected**: **SpectoLabs Hoverfly**. π **Versions**: **1.11.3 and earlier**. Any instance running these versions with the middleware API exposed is at risk.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Full **RCE**. Hackers can execute arbitrary commands with the privileges of the Hoverfly process. π **Data Impact**: High risk of data exfiltration, system compromise, and lateral movement.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Exploitation Threshold**: **LOW**. π« **Auth**: **Unauthenticated** (PR:N). π±οΈ **UI**: **None required** (UI:N). π **Network**: Remote (AV:N). If the port is open, you are vulnerable.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploit**: **YES**. A Nuclei template is available via ProjectDiscovery. π **PoC**: Confirmed via GitHub Security Advisory (GHSA-r4h8-hfp2-ggmf). Wild exploitation is highly likely.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **Hoverfly v1.11.3 or below**. Check if the `/api/v2/hoverfly/middleware` endpoint is accessible. π§ͺ Use Nuclei with the provided CVE template to verify injection points.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **YES**. SpectoLabs has released patches. π **Commit**: See `17e60a9` and `a9d4da7` on GitHub. π **Action**: Upgrade to the latest version immediately.
Q9What if no patch? (Workaround)
π§ **No Patch Workaround**: **Block Network Access**. Restrict access to the middleware API endpoint (`/api/v2/hoverfly/middleware`) via firewall rules. π Do not expose it to the internet without authentication.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. CVSS Score is **High (9.8+ implied by H/H/H)**. β³ **Priority**: Patch **IMMEDIATELY**. This is an unauthenticated RCE; automated scanners are already hunting for this.