{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15131","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-27T09:36:42.617Z","datePublished":"2025-12-28T10:02:06.337Z","dateUpdated":"2025-12-29T18:01:13.797Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-28T10:02:06.337Z"},"title":"ZSPACE Z4Pro+ HTTP POST Request status zfilev2_api_SafeStatus command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"ZSPACE","product":"Z4Pro+","versions":[{"version":"1.0.0440024","status":"affected"}],"modules":["HTTP POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-27T10:41:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LX-66-LX (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338509","name":"VDB-338509 | ZSPACE Z4Pro+ HTTP POST Request status zfilev2_api_SafeStatus command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338509","name":"VDB-338509 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.713874","name":"Submit #713874 | ZSPACE Z4Pro+ v1.0.0440024 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/LX-66-LX/cve/issues/1","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-29T18:01:07.314700Z","id":"CVE-2025-15131","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-29T18:01:13.797Z"}}]}}