{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15009","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-21T12:51:06.591Z","datePublished":"2025-12-22T02:32:05.919Z","dateUpdated":"2025-12-22T14:35:21.606Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-22T02:32:05.919Z"},"title":"liweiyi ChestnutCMS Filename upload FilenameUtils.getExtension unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"liweiyi","product":"ChestnutCMS","versions":[{"version":"1.5.0","status":"affected"},{"version":"1.5.1","status":"affected"},{"version":"1.5.2","status":"affected"},{"version":"1.5.3","status":"affected"},{"version":"1.5.4","status":"affected"},{"version":"1.5.5","status":"affected"},{"version":"1.5.6","status":"affected"},{"version":"1.5.7","status":"affected"},{"version":"1.5.8","status":"affected"}],"modules":["Filename Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in liweiyi ChestnutCMS up to 1.5.8. This vulnerability affects the function FilenameUtils.getExtension of the file /dev-api/common/upload of the component Filename Handler. Executing manipulation of the argument File can lead to unrestricted upload. The attack may be launched remotely. The exploit has been published and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-21T13:56:15.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yuccun (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.337715","name":"VDB-337715 | liweiyi ChestnutCMS Filename upload FilenameUtils.getExtension unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.337715","name":"VDB-337715 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.719590","name":"Submit #719590 | liweiyi ChestnutCMS <=1.5.8 Unrestricted Upload","tags":["third-party-advisory"]},{"url":"https://github.com/yuccun/CVE/blob/main/ChestnutCMS-Arbitrary_File_Upload.md","tags":["related"]},{"url":"https://github.com/yuccun/CVE/blob/main/ChestnutCMS-Arbitrary_File_Upload.md#vulnerability-proof","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-22T14:35:11.503729Z","id":"CVE-2025-15009","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-22T14:35:21.606Z"}}]}}