Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15067: CWE-434 Unrestricted Upload of File with Dangerous Type in Innorix Innorix WP

0
High
VulnerabilityCVE-2025-15067cvecve-2025-15067cwe-434
Published: Mon Dec 29 2025 (12/29/2025, 00:59:38 UTC)
Source: CVE Database V5
Vendor/Project: Innorix
Product: Innorix WP

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Innorix Innorix WP allows Upload a Web Shell to a Web Server.This issue affects Innorix WP from All versions If the "exam" directory exists under the directory where the product is installed (ex: innorix/exam)

AI-Powered Analysis

AILast updated: 12/30/2025, 23:23:43 UTC

Technical Analysis

CVE-2025-15067 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in the Innorix WP product. This vulnerability arises when the 'exam' directory exists within the installation path of Innorix WP, allowing attackers to upload arbitrary files without restrictions. Specifically, attackers can upload web shells—malicious scripts that provide remote command execution capabilities on the web server. The vulnerability affects all versions of Innorix WP, indicating a systemic issue in the product's file upload handling mechanisms. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no attack prerequisites (AT:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) and integrity (VI:H), with no impact on availability (VA:N). This means an attacker with local access to the server or application environment can exploit this vulnerability without authentication or user interaction, leading to full compromise of sensitive data and control over the system. The lack of a patch at the time of publication increases the urgency for organizations to implement compensating controls. While no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical threat vector for web servers running Innorix WP, especially if the 'exam' directory is present and accessible.

Potential Impact

For European organizations, the impact of CVE-2025-15067 can be severe. Exploitation allows attackers to upload web shells, which can lead to unauthorized remote code execution, data theft, defacement, or pivoting within the network. This compromises the confidentiality and integrity of sensitive information and can disrupt business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Innorix WP for web services are particularly at risk. The vulnerability's ability to be exploited without authentication or user interaction increases the attack surface, especially in environments where local access or limited access to the web server is possible. Additionally, the presence of the 'exam' directory, which may be overlooked during security audits, can serve as an unnoticed entry point for attackers. The potential for lateral movement and persistence within networks following initial exploitation further elevates the threat to European enterprises. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

European organizations should take immediate and specific actions to mitigate CVE-2025-15067: 1) Conduct a thorough audit of all Innorix WP installations to identify the presence of the 'exam' directory and remove it if not required. 2) Implement strict file upload validation controls that restrict file types and enforce content inspection to prevent web shell uploads. 3) Apply the principle of least privilege to the web server and application directories, limiting write permissions to only necessary locations. 4) Monitor web server logs and file system changes for unusual upload activity or the presence of suspicious files. 5) Employ web application firewalls (WAFs) with rules designed to detect and block web shell signatures and malicious upload attempts. 6) Isolate Innorix WP instances in segmented network zones to limit lateral movement if compromise occurs. 7) Engage with Innorix for patches or official guidance and apply updates promptly once available. 8) Educate system administrators about this vulnerability and the importance of securing upload directories. These measures go beyond generic advice by focusing on the specific conditions and exploitation vectors of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
FSI
Date Reserved
2025-12-24T04:53:23.307Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b5db813ff03e2bf282

Added to database: 12/30/2025, 10:22:45 PM

Last enriched: 12/30/2025, 11:23:43 PM

Last updated: 2/7/2026, 7:42:00 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats