{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15242","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-29T08:16:05.639Z","datePublished":"2025-12-30T09:32:07.221Z","dateUpdated":"2026-02-24T06:15:47.302Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:15:47.302Z"},"title":"PHPEMS Coupon race condition","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-362","lang":"en","description":"Race Condition"}]}],"affected":[{"vendor":"n/a","product":"PHPEMS","versions":[{"version":"11.0","status":"affected"}],"cpes":["cpe:2.3:a:phpems:phpems:*:*:*:*:*:*:*:*"],"modules":["Coupon Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in PHPEMS up to 11.0. The impacted element is an unknown function of the component Coupon Handler. Performing a manipulation results in race condition. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is regarded as difficult. The exploit is now public and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":2.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"LOW"}},{"cvssV3_1":{"version":"3.1","baseScore":3.1,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.1,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.1,"vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-30T12:58:26.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"byebyedoggy (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338632","name":"VDB-338632 | PHPEMS Coupon race condition","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.338632","name":"VDB-338632 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.725661","name":"Submit #725661 | PHPEMS <=11.0 Race Condition","tags":["third-party-advisory"]},{"url":"https://byebydoggy.github.io/post/2025/1229-phpems-coupon-recharge-race-condition-poc/","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-30T16:00:33.509338Z","id":"CVE-2025-15242","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-30T16:00:48.345Z"}}]}}