{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15495","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-09T11:36:37.798Z","datePublished":"2026-01-09T17:02:09.494Z","dateUpdated":"2026-02-23T08:26:22.169Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:26:22.169Z"},"title":"BiggiDroid Simple PHP CMS editsite.php unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"BiggiDroid","product":"Simple PHP CMS","versions":[{"version":"1.0","status":"affected"}],"cpes":["cpe:2.3:a:biggidroid:simple_php_cms:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in BiggiDroid Simple PHP CMS 1.0. This impacts an unknown function of the file /admin/editsite.php. The manipulation of the argument image results in unrestricted upload. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-23T11:23:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"k271266","type":"finder"},{"lang":"en","value":"moasim","type":"finder"},{"lang":"en","value":"k271266 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.340273","name":"VDB-340273 | BiggiDroid Simple PHP CMS editsite.php unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.340273","name":"VDB-340273 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.725890","name":"Submit #725890 | BiggiDroid Simple PHP CMS 1.0 Unrestricted Upload","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.726040","name":"Submit #726040 | BiggiDroid Simple PHP CMS 1.0 Unrestricted Upload (Duplicate)","tags":["third-party-advisory"]},{"url":"https://gitee.com/hdert/ck/issues/IDGO28","tags":["issue-tracking"]},{"url":"https://github.com/Asim-QAZi/RCE-Simplephpblog-biggiedroid","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/Asim-QAZi/RCE-Simplephpblog-biggiedroid","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-09T17:46:37.119255Z","id":"CVE-2025-15495","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-09T18:36:52.503Z"}}]}}