{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15148","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-27T13:30:04.230Z","datePublished":"2025-12-28T18:02:08.178Z","dateUpdated":"2026-02-24T06:07:52.962Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:07:52.962Z"},"title":"CmsEasy Backend Template Management template_admin.php savetemp_action code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"CmsEasy","versions":[{"version":"7.7.0","status":"affected"},{"version":"7.7.1","status":"affected"},{"version":"7.7.2","status":"affected"},{"version":"7.7.3","status":"affected"},{"version":"7.7.4","status":"affected"},{"version":"7.7.5","status":"affected"},{"version":"7.7.6","status":"affected"},{"version":"7.7.7","status":"affected"}],"cpes":["cpe:2.3:a:cmseasy:cmseasy:*:*:*:*:*:*:*:*"],"modules":["Backend Template Management Page"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in CmsEasy up to 7.7.7. Affected is the function savetemp_action in the library /lib/admin/template_admin.php of the component Backend Template Management Page. Executing a manipulation of the argument content/tempdata can lead to code injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-06T23:03:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yu22x (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.338525","name":"VDB-338525 | CmsEasy Backend Template Management template_admin.php savetemp_action code injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338525","name":"VDB-338525 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.716303","name":"Submit #716303 | cmseasy 7.7.7 Command Injection","tags":["third-party-advisory"]},{"url":"https://note-hxlab.wetolink.com/share/msJH69Y06ZlS","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-29T21:22:16.343439Z","id":"CVE-2025-15148","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-29T21:22:26.770Z"}}]}}