Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers

Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers

Posted on July 21, 2025July 21, 2025 By CWS

A vital distant code execution vulnerability has been found in Lighthouse Studio, probably the most broadly deployed but comparatively unknown survey software program platforms developed by Sawtooth Software program.

The flaw, designated CVE-2025-34300, impacts the Perl CGI scripts that energy web-based surveys, probably exposing 1000’s of internet hosting servers to finish compromise by attackers who possess nothing greater than a survey hyperlink.

Lighthouse Studio operates by way of a twin structure consisting of a Home windows desktop utility for survey creation and a set of Perl CGI scripts deployed on internet servers to deal with respondent interactions.

The vulnerability resides particularly within the server-side elements, the place a templating engine processes person enter with out correct sanitization.

Safety researchers at Assetnote found that the software program’s templating system evaluates content material between [% %] markers as executable Perl code, making a direct pathway for distant code execution.

Slcyber analysts famous that the vulnerability’s affect extends far past particular person installations, as these CGI scripts are incessantly copied throughout a number of surveys inside organizations.

A single firm would possibly function tens or a whole bunch of weak script cases throughout their internet infrastructure, with no automated replace mechanism to deal with safety patches.

This proliferation considerably amplifies the potential assault floor and complicates remediation efforts.

Technical Exploitation Mechanics

The vulnerability exploits a basic flaw within the software program’s enter processing workflow.

The weak code snippet demonstrates how person enter reaches an eval() perform with out enough validation:-

sub _foq {
my ( $_gtp, $_gvf ) = @_;
my $_ejf = “”;
$_ejf = eval($_gtp);
# Further error dealing with code
}

Attackers can exploit this by injecting malicious payloads by way of the hid_Random_ACARAT parameter, equivalent to [%257*7%25], which will get processed by the templating engine and executed as Perl code.

For older software program variations that implement fundamental enter filtering, researchers found a bypass method utilizing duplicate parameter names: hid_Random_ACARAT=[%257*7%25]&hid_Random_ACARAT=x.

This strategy leverages Perl’s array reference dealing with conduct to bypass the filtering mechanisms totally.

Sawtooth Software program launched model 9.16.14 on July ninth, 2025, addressing this vital safety flaw.

Organizations working Lighthouse Studio ought to instantly replace to the patched model to forestall potential compromise of their internet hosting infrastructure.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Access, Attackers, Gain, Hosting, Lighthouse, RCE, Servers, Studio, Vulnerability

Post navigation

Previous Post: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More
Next Post: CISA Warns of Microsoft SharePoint server 0-Day RCE Vulnerability Exploited in Wild

Related Posts

Meta to Cease Instagram E2EE Messaging by 2026 Meta to Cease Instagram E2EE Messaging by 2026 Cyber Security News
AccuKnox Awarded Patent for Runtime Security of Kernel Events AccuKnox Awarded Patent for Runtime Security of Kernel Events Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Cyber Security News
Microsoft’s Critical Windows 11 Updates Enhance Security Microsoft’s Critical Windows 11 Updates Enhance Security Cyber Security News
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark