CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-26074
9.895.80%

OmniSync's Diagnostic Disaster: A Trivial Command Injection for the Modern Age

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·10 min read·10 visits

Weaponized

Executive Summary (TL;DR)

A high-impact, unauthenticated RCE in OmniSync Data Orchestrator's diagnostics API. Attackers can execute shell commands by simply crafting a malicious 'hostname' in a request to the '/api/v1/diagnostics/ping' endpoint. Patch immediately or face the consequences.

A critical OS command injection vulnerability exists in the diagnostics API endpoint of OmniSync Data Orchestrator versions 3.0.0 through 3.5.1. An unauthenticated remote attacker can inject arbitrary shell commands by manipulating the 'hostname' parameter of the '/api/v1/diagnostics/ping' endpoint. The vulnerability stems from the direct concatenation of user-supplied input into a string that is later executed by the system shell, leading to Remote Code Execution (RCE) with the privileges of the OmniSync service account.

Official Patches

OmniSync Inc.Official vendor advisory and patch information for CVE-2025-26074.

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
95.80%
Top 4% most exploited

Affected Systems

OmniSync Data Orchestrator

Affected Versions Detail

Product
Affected Versions
Fixed Version
OmniSync Data Orchestrator
OmniSync Inc.
>= 3.0.0, <= 3.5.13.5.2
AttributeDetail
CWE IDCWE-78
CWE NameImproper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
CVSS v3.1 Score9.8 (Critical)
Exploit StatusWeaponized

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Known Exploits & Detection

GitHubA fully weaponized Python exploit that provides an interactive shell.
Metasploit FrameworkOfficial Metasploit module for CVE-2025-26074.

Vulnerability Timeline

Vulnerability discovered by an independent security researcher.
2025-03-15
Vendor (OmniSync Inc.) notified via responsible disclosure program.
2025-03-16
Vendor confirms the vulnerability and begins work on a patch.
2025-04-10
OmniSync releases version 3.5.2 with the patch.
2025-05-20
Coordinated public disclosure and CVE-2025-26074 is published.
2025-06-05
Proof-of-concept exploit code published on GitHub.
2025-06-07

References & Sources

  • [1]NVD Entry for CVE-2025-26074
  • [2]Initial vulnerability disclosure report on HackerOne (redacted)
  • [3]Blog Post: OmniSync RCE for Fun and Profit - A Technical Writeup

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.