CVE-2025-26074

OmniSync's Diagnostic Disaster: A Trivial Command Injection for the Modern Age

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·10 min read·7 visits

Executive Summary (TL;DR)

A high-impact, unauthenticated RCE in OmniSync Data Orchestrator's diagnostics API. Attackers can execute shell commands by simply crafting a malicious 'hostname' in a request to the '/api/v1/diagnostics/ping' endpoint. Patch immediately or face the consequences.

A critical OS command injection vulnerability exists in the diagnostics API endpoint of OmniSync Data Orchestrator versions 3.0.0 through 3.5.1. An unauthenticated remote attacker can inject arbitrary shell commands by manipulating the 'hostname' parameter of the '/api/v1/diagnostics/ping' endpoint. The vulnerability stems from the direct concatenation of user-supplied input into a string that is later executed by the system shell, leading to Remote Code Execution (RCE) with the privileges of the OmniSync service account.

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
95.80%
Top 4% most exploited

Affected Systems

OmniSync Data Orchestrator

Affected Versions Detail

Product
Affected Versions
Fixed Version
OmniSync Data Orchestrator
OmniSync Inc.
>= 3.0.0, <= 3.5.13.5.2
AttributeDetail
CWE IDCWE-78
CWE NameImproper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
CVSS v3.1 Score9.8 (Critical)
Exploit StatusWeaponized
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Vulnerability Timeline

Vulnerability discovered by an independent security researcher.
2025-03-15
Vendor (OmniSync Inc.) notified via responsible disclosure program.
2025-03-16
Vendor confirms the vulnerability and begins work on a patch.
2025-04-10
OmniSync releases version 3.5.2 with the patch.
2025-05-20
Coordinated public disclosure and CVE-2025-26074 is published.
2025-06-05
Proof-of-concept exploit code published on GitHub.
2025-06-07

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.