CVE-2025-15133
Published: 28 December 2025
Description
A vulnerability was identified in ZSPACE Z4Pro+ 1.0.0440024. The impacted element is the function zfilev2_api_CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. Such manipulation leads to command injection. It is possible to launch the attack remotely.…
more
The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of untrusted HTTP POST inputs to the zfilev2_api_CloseSafe function, directly preventing command injection exploitation.
Mandates timely remediation of the identified command injection flaw in ZSPACE Z4Pro+ version 1.0.0440024.
Vulnerability scanning detects command injection vulnerabilities like CVE-2025-15133 in HTTP POST handlers for subsequent remediation.
Security SummaryAI
CVE-2025-15133 is a command injection vulnerability (CWE-74, CWE-77) in ZSPACE Z4Pro+ version 1.0.0440024. The affected component is the HTTP POST Request Handler, specifically the zfilev2_api_CloseSafe function at the /v2/file/safe/close endpoint. Manipulation of this function enables command injection, with the vulnerability published on 2025-12-28 and assigned a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability can be exploited remotely by an attacker with low privileges (PR:L), requiring low attack complexity and no user interaction. Successful exploitation grants limited impacts on confidentiality, integrity, and availability, potentially allowing arbitrary command execution on the affected system. A public exploit is available and might be used in attacks.
Advisories referenced in VulDB entries (ctiid.338511, id.338511, submit.713887) and a GitHub issue (LX-66-LX/cve/issues/3) provide details on the vulnerability. The vendor was contacted early regarding this disclosure, though specific patch information is not detailed in the available references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability in HTTP POST endpoint enables remote exploitation of public-facing application (T1190) and execution via command and scripting interpreter (T1059).