{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1555","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-02-21T15:05:24.957Z","datePublished":"2025-02-21T21:00:12.239Z","dateUpdated":"2025-02-24T14:52:47.917Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-02-21T21:00:12.239Z"},"title":"hzmanyun Education and Training System saveImage unrestricted upload","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-434","lang":"en","description":"Unrestricted Upload"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]}],"affected":[{"vendor":"hzmanyun","product":"Education and Training System","versions":[{"version":"3.1.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. This vulnerability affects the function saveImage. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In hzmanyun Education and Training System 3.1.1 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Das betrifft die Funktion saveImage. Dank Manipulation des Arguments file mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-02-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-02-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-02-21T16:10:28.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"mike111 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.296506","name":"VDB-296506 | hzmanyun Education and Training System saveImage unrestricted upload","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.296506","name":"VDB-296506 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.496932","name":"Submit #496932 | hzmanyun education and training system v3.1.1 RCE","tags":["third-party-advisory"]},{"url":"https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-24T14:52:43.971636Z","id":"CVE-2025-1555","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-24T14:52:47.917Z"}}]}}