First published: Tue May 06 2025(Updated: )
## Impact: A security issue has been found in `terraform-provider-windns` before version `1.0.5`. The `windns_record` resource did not santize the input variables. This can lead to authenticated command injection in the underlyding powershell command prompt. ## Patches: [`83ef736 (fix: better input validation)`](https://github.com/nrkno/terraform-provider-windns/commit/c76f69610c1b502f90aaed8c4f102194530b5bce) ## Fixed versions: - `v1.0.5`
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/nrkno/terraform-provider-windns | <=1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46735 is considered a high-severity vulnerability due to the potential for authenticated command injection.
To fix CVE-2025-46735, you should upgrade the 'terraform-provider-windns' to version 1.0.5 or newer.
CVE-2025-46735 exposes the application to authenticated command injection via unsanitized input variables.
Versions of 'terraform-provider-windns' prior to 1.0.5 are affected by CVE-2025-46735.
There are no known workarounds for CVE-2025-46735, so updating to a patched version is strongly recommended.