Overview
CVE-2025-46661 is a severe vulnerability found in IPW Systems Metazo versions up to 8.1.3. This vulnerability allows unauthenticated Remote Code Execution (RCE) due to a Server-Side Template Injection (SSTI) flaw in smartyValidator.php. This vulnerability is particularly alarming because it can potentially lead to system compromise or data leakage. It impacts all users of IPW Systems Metazo who have not updated their software to the latest version.
Vulnerability Summary
CVE ID: CVE-2025-46661
Severity: Critical (CVSS: 10.0)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
IPW Systems Metazo | Up to and including 8.1.3
How the Exploit Works
The exploit takes advantage of an SSTI flaw in smartyValidator.php. The vulnerability allows the attacker to inject malicious template expressions, which are subsequently executed by the server. As there is no requirement for authentication, a remote attacker can potentially take over the system or cause data leakage.
Conceptual Example Code
A potential exploitation of this vulnerability might look like this:
POST /smartyValidator.php HTTP/1.1
Host: target.example.com
Content-Type: application/text
{ "template": "{{ malicious_payload }}" }
In the above example, the attacker sends a POST request with a malicious template expression. The server then processes this template, leading to Remote Code Execution.
Mitigation and Prevention
The best way to mitigate this vulnerability is to apply the patch provided by the vendor. All instances of IPW Systems Metazo should be upgraded immediately to the latest version, which contains the necessary security patches. In situations where an immediate upgrade is not possible, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation by blocking or alerting on suspicious activity. However, these measures are not a replacement for patching the vulnerable software.