{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15422","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-01T11:09:40.253Z","datePublished":"2026-01-02T01:32:07.962Z","dateUpdated":"2026-02-23T08:06:13.366Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:06:13.366Z"},"title":"EmpireSoft EmpireCMS IP Address connect.php egetip protection mechanism","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-693","lang":"en","description":"Protection Mechanism Failure"}]}],"affected":[{"vendor":"EmpireSoft","product":"EmpireCMS","versions":[{"version":"8.0","status":"affected"}],"modules":["IP Address Handler"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in EmpireSoft EmpireCMS up to 8.0. This issue affects the function egetip of the file e/class/connect.php of the component IP Address Handler. This manipulation causes protection mechanism failure. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-08T08:39:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"gets (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.339344","name":"VDB-339344 | EmpireSoft EmpireCMS IP Address connect.php egetip protection mechanism","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.339344","name":"VDB-339344 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.721344","name":"Submit #721344 | EmpireCMS <=8.0 Privilege Escalation","tags":["third-party-advisory"]},{"url":"https://note-hxlab.wetolink.com/share/0x74KEtzecFb","tags":["related"]},{"url":"https://note-hxlab.wetolink.com/share/0x74KEtzecFb#-span--strong-proof-of-concept---strong---span-","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://note-hxlab.wetolink.com/share/0x74KEtzecFb","tags":["exploit"]},{"url":"https://note-hxlab.wetolink.com/share/0x74KEtzecFb#-span--strong-proof-of-concept---strong---span-","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-05T20:46:58.591345Z","id":"CVE-2025-15422","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-05T21:50:27.684Z"}}]}}