{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15244","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-29T08:20:03.791Z","datePublished":"2025-12-30T10:32:05.640Z","dateUpdated":"2026-02-24T06:16:12.068Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:16:12.068Z"},"title":"PHPEMS Purchase Request race condition","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-362","lang":"en","description":"Race Condition"}]}],"affected":[{"vendor":"n/a","product":"PHPEMS","versions":[{"version":"11.0","status":"affected"}],"cpes":["cpe:2.3:a:phpems:phpems:*:*:*:*:*:*:*:*"],"modules":["Purchase Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in PHPEMS up to 11.0. This impacts an unknown function of the component Purchase Request Handler. The manipulation leads to race condition. The attack may be initiated remotely. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been disclosed to the public and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.7,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.7,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":2.6,"vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-30T13:17:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"byebyedoggy (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.338634","name":"VDB-338634 | PHPEMS Purchase Request race condition","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.338634","name":"VDB-338634 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.725727","name":"Submit #725727 | PHPEMS <=11.0 Race Condition","tags":["third-party-advisory"]},{"url":"https://byebydoggy.github.io/post/2025/1229-phpems-points-race-condition-poc/","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-30T16:02:08.211726Z","id":"CVE-2025-15244","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-30T16:02:21.268Z"}}]}}