CVE-2025-15240
Published: 05 January 2026
Description
QOCA aim AI Medical Cloud Platform developed by Quanta Computer has an Arbitrary File Upload vulnerability, allowing authenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs, directly preventing arbitrary file uploads by checking file content, type, and structure to block web shells.
SI-9 restricts types, amounts, and characteristics of inputs, preventing upload of executable web shells through file type whitelisting and limits.
SI-3 provides malicious code protection to scan and quarantine uploaded web shells before execution on the server.
Security SummaryAI
CVE-2025-15240 is an Arbitrary File Upload vulnerability (CWE-434) in the QOCA aim AI Medical Cloud Platform developed by Quanta Computer. Published on 2026-01-05, it enables authenticated remote attackers to upload and execute web shell backdoors, resulting in arbitrary code execution on the server. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low attack complexity, and significant impacts across confidentiality, integrity, and availability.
An attacker with low-privilege authenticated access can exploit this flaw remotely over the network without requiring user interaction. By uploading malicious files such as web shells, the attacker achieves arbitrary code execution on the server, potentially leading to full system compromise, data exfiltration, or further lateral movement within the environment.
TWCERT advisories at https://www.twcert.org.tw/en/cp-139-10616-cd942-2.html and https://www.twcert.org.tw/tw/cp-132-10615-157a3-1.html provide details on the vulnerability, including guidance for practitioners on identification and response.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: ai
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of a public-facing web application (T1190) via arbitrary file upload by authenticated users, directly facilitating deployment and execution of web shells (T1505.003) for arbitrary code execution.