Cyber Posture

CVE-2025-15132

MediumPublic PoC

Published: 28 December 2025

Published
28 December 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0043 62.7th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability was determined in ZSPACE Z4Pro+ 1.0.0440024. The affected element is the function zfilev2_api_open of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation causes command injection. It is possible to initiate the attack remotely. The…

more

exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by requiring validation and error handling of HTTP POST inputs to the vulnerable zfilev2_api_open endpoint.

prevent

Mandates timely identification, reporting, and correction of the specific command injection flaw in ZSPACE Z4Pro+ version 1.0.0440024.

preventdetect

Enforces boundary protection to monitor and filter malicious HTTP POST requests targeting the /v2/file/safe/open endpoint, blocking injection attempts.

Security SummaryAI

CVE-2025-15132 is a command injection vulnerability affecting ZSPACE Z4Pro+ version 1.0.0440024. The flaw resides in the zfilev2_api_open function within the /v2/file/safe/open endpoint of the HTTP POST Request Handler component. It is associated with CWEs-74 and CWE-77 and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

An attacker can exploit this vulnerability remotely by manipulating HTTP POST requests to the affected endpoint, provided they possess low privileges. Exploitation requires low complexity and no user interaction, enabling limited impacts on confidentiality, integrity, and availability. A proof-of-concept exploit has been publicly disclosed and may be utilized.

Advisories provide further details via references such as https://github.com/LX-66-LX/cve/issues/2, https://vuldb.com/?ctiid.338510, https://vuldb.com/?id.338510, and https://vuldb.com/?submit.713885. The vendor was contacted early about the disclosure, published on 2025-12-28.

Details

CWE(s)

Affected Products

zspace
z4pro\+ firmware
≤ 1.0.0440024

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection in public-facing HTTP endpoint enables exploitation of public-facing application (T1190) and arbitrary command execution via system interpreters (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References