{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15110","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-26T23:14:21.062Z","datePublished":"2025-12-27T20:02:09.663Z","dateUpdated":"2026-02-24T06:05:58.343Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:05:58.343Z"},"title":"jackq XCMS Backend ProductImageController.class.php upload unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"jackq","product":"XCMS","versions":[{"version":"3fab5342cc509945a7ce1b8ec39d19f701b89261","status":"affected"}],"cpes":["cpe:2.3:a:jackq:xcms:*:*:*:*:*:*:*:*"],"modules":["Backend"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in jackq XCMS up to 3fab5342cc509945a7ce1b8ec39d19f701b89261. Affected is the function Upload of the file Admin/Home/Controller/ProductImageController.class.php of the component Backend. Such manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-26T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-09T22:16:50.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"formanagain (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338481","name":"VDB-338481 | jackq XCMS Backend ProductImageController.class.php upload unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338481","name":"VDB-338481 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.711702","name":"Submit #711702 | XCMS 1.1 Unrestricted Upload","tags":["third-party-advisory"]},{"url":"https://gitee.com/jackq/XCMS/issues/IDC5C8","tags":["exploit","issue-tracking"]},{"url":"https://gitee.com/jackq/XCMS/","tags":["product"]}]},"adp":[{"references":[{"url":"https://gitee.com/jackq/XCMS/issues/IDC5C8","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-29T16:43:11.588765Z","id":"CVE-2025-15110","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-29T16:51:10.398Z"}}]}}