{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15393","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-31T09:16:51.462Z","datePublished":"2025-12-31T18:32:05.051Z","dateUpdated":"2026-01-05T14:40:23.007Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-31T18:32:05.051Z"},"title":"Kohana KodiCMS Layout API Endpoint file.php save code injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Kohana","product":"KodiCMS","versions":[{"version":"13.82.135","status":"affected"}],"modules":["Layout API Endpoint"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in Kohana KodiCMS up to 13.82.135. This impacts the function Save of the file cms/modules/kodicms/classes/kodicms/model/file.php of the component Layout API Endpoint. The manipulation of the argument content leads to code injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-31T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-31T10:22:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"hiro (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.339162","name":"VDB-339162 | Kohana KodiCMS Layout API Endpoint file.php save code injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.339162","name":"VDB-339162 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.718290","name":"Submit #718290 | KodiCMS https://github.com/KodiCMS-Kohana/cms 13.82.135 Code Injection","tags":["third-party-advisory"]}]},"adp":[{"references":[{"url":"https://vuldb.com/?submit.718290","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-05T14:40:16.191398Z","id":"CVE-2025-15393","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-05T14:40:23.007Z"}}]}}