CVE-2025-10097
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious code into the SimStudioAI application, potentially compromising its functionality. The attack can be executed remotely, meaning the attacker doesn’t need physical access to the system, but it requires the attacker to manipulate specific input in the application.
Technical Description
A vulnerability was identified in SimStudioAI sim up to 1.0.0. This impacts an unknown function of the file apps/sim/app/api/function/execute/route.ts. The manipulation of the argument code leads to code injection. The attack is possible to be carried out remotely.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Sep 8, 2025
7 months ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
sim
Product
sim
Related Vulnerabilities
An attacker can steal OAuth access tokens for any user by simply providing their user ID and a provider name, allowing them to access third-party services without needing to log in. This vulnerability affects versions of SimStudio below 0.5.74 and does not require any authentication, making it particularly dangerous.
An attacker can exploit this vulnerability to connect to any accessible MongoDB database and perform unauthorized actions like reading, changing, or deleting data. This is possible because the affected version of SimStudio allows anyone to send connection requests without needing to log in or restrict which hosts can connect.