CVE-2025-15132
Published: 28 December 2025
Description
A vulnerability was determined in ZSPACE Z4Pro+ 1.0.0440024. The affected element is the function zfilev2_api_open of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation causes command injection. It is possible to initiate the attack remotely. The…
more
exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by requiring validation and error handling of HTTP POST inputs to the vulnerable zfilev2_api_open endpoint.
Mandates timely identification, reporting, and correction of the specific command injection flaw in ZSPACE Z4Pro+ version 1.0.0440024.
Enforces boundary protection to monitor and filter malicious HTTP POST requests targeting the /v2/file/safe/open endpoint, blocking injection attempts.
Security SummaryAI
CVE-2025-15132 is a command injection vulnerability affecting ZSPACE Z4Pro+ version 1.0.0440024. The flaw resides in the zfilev2_api_open function within the /v2/file/safe/open endpoint of the HTTP POST Request Handler component. It is associated with CWEs-74 and CWE-77 and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
An attacker can exploit this vulnerability remotely by manipulating HTTP POST requests to the affected endpoint, provided they possess low privileges. Exploitation requires low complexity and no user interaction, enabling limited impacts on confidentiality, integrity, and availability. A proof-of-concept exploit has been publicly disclosed and may be utilized.
Advisories provide further details via references such as https://github.com/LX-66-LX/cve/issues/2, https://vuldb.com/?ctiid.338510, https://vuldb.com/?id.338510, and https://vuldb.com/?submit.713885. The vendor was contacted early about the disclosure, published on 2025-12-28.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public-facing HTTP endpoint enables exploitation of public-facing application (T1190) and arbitrary command execution via system interpreters (T1059).