CVE-2019-25158: Pedroetb TTS-API OS Command Injection
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.75214%
CWE
Published
12/19/2023
Updated
12/28/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
tts-api | npm | < 2.2.0 | 2.2.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key points:
- processData used child_process.exec - which executes commands via the system shell - with untrusted input.
- Command-generation functions concatenated user inputs into shell command strings without sanitization.
Though the CVE description mentions onSpeechDone, analysis of the commit diff shows:
- The critical fix replaced exec() with spawn() in processData
- Command-generation functions were modified to use parameterized arguments arrays
- onSpeechDone was a callback handler for command completion, not the execution point. The root vulnerability was in the command construction/execution pattern, not the result handling.