CVE-2025-15067: CWE-434 Unrestricted Upload of File with Dangerous Type in Innorix Innorix WP
Unrestricted Upload of File with Dangerous Type vulnerability in Innorix Innorix WP allows Upload a Web Shell to a Web Server.This issue affects Innorix WP from All versions If the "exam" directory exists under the directory where the product is installed (ex: innorix/exam)
AI Analysis
Technical Summary
CVE-2025-15067 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in the Innorix WP product. This vulnerability arises when the 'exam' directory exists within the installation path of Innorix WP, allowing attackers to upload arbitrary files without restrictions. Specifically, attackers can upload web shells—malicious scripts that provide remote command execution capabilities on the web server. The vulnerability affects all versions of Innorix WP, indicating a systemic issue in the product's file upload handling mechanisms. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no attack prerequisites (AT:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) and integrity (VI:H), with no impact on availability (VA:N). This means an attacker with local access to the server or application environment can exploit this vulnerability without authentication or user interaction, leading to full compromise of sensitive data and control over the system. The lack of a patch at the time of publication increases the urgency for organizations to implement compensating controls. While no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical threat vector for web servers running Innorix WP, especially if the 'exam' directory is present and accessible.
Potential Impact
For European organizations, the impact of CVE-2025-15067 can be severe. Exploitation allows attackers to upload web shells, which can lead to unauthorized remote code execution, data theft, defacement, or pivoting within the network. This compromises the confidentiality and integrity of sensitive information and can disrupt business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Innorix WP for web services are particularly at risk. The vulnerability's ability to be exploited without authentication or user interaction increases the attack surface, especially in environments where local access or limited access to the web server is possible. Additionally, the presence of the 'exam' directory, which may be overlooked during security audits, can serve as an unnoticed entry point for attackers. The potential for lateral movement and persistence within networks following initial exploitation further elevates the threat to European enterprises. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
European organizations should take immediate and specific actions to mitigate CVE-2025-15067: 1) Conduct a thorough audit of all Innorix WP installations to identify the presence of the 'exam' directory and remove it if not required. 2) Implement strict file upload validation controls that restrict file types and enforce content inspection to prevent web shell uploads. 3) Apply the principle of least privilege to the web server and application directories, limiting write permissions to only necessary locations. 4) Monitor web server logs and file system changes for unusual upload activity or the presence of suspicious files. 5) Employ web application firewalls (WAFs) with rules designed to detect and block web shell signatures and malicious upload attempts. 6) Isolate Innorix WP instances in segmented network zones to limit lateral movement if compromise occurs. 7) Engage with Innorix for patches or official guidance and apply updates promptly once available. 8) Educate system administrators about this vulnerability and the importance of securing upload directories. These measures go beyond generic advice by focusing on the specific conditions and exploitation vectors of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-15067: CWE-434 Unrestricted Upload of File with Dangerous Type in Innorix Innorix WP
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Innorix Innorix WP allows Upload a Web Shell to a Web Server.This issue affects Innorix WP from All versions If the "exam" directory exists under the directory where the product is installed (ex: innorix/exam)
AI-Powered Analysis
Technical Analysis
CVE-2025-15067 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in the Innorix WP product. This vulnerability arises when the 'exam' directory exists within the installation path of Innorix WP, allowing attackers to upload arbitrary files without restrictions. Specifically, attackers can upload web shells—malicious scripts that provide remote command execution capabilities on the web server. The vulnerability affects all versions of Innorix WP, indicating a systemic issue in the product's file upload handling mechanisms. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no attack prerequisites (AT:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) and integrity (VI:H), with no impact on availability (VA:N). This means an attacker with local access to the server or application environment can exploit this vulnerability without authentication or user interaction, leading to full compromise of sensitive data and control over the system. The lack of a patch at the time of publication increases the urgency for organizations to implement compensating controls. While no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical threat vector for web servers running Innorix WP, especially if the 'exam' directory is present and accessible.
Potential Impact
For European organizations, the impact of CVE-2025-15067 can be severe. Exploitation allows attackers to upload web shells, which can lead to unauthorized remote code execution, data theft, defacement, or pivoting within the network. This compromises the confidentiality and integrity of sensitive information and can disrupt business operations. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Innorix WP for web services are particularly at risk. The vulnerability's ability to be exploited without authentication or user interaction increases the attack surface, especially in environments where local access or limited access to the web server is possible. Additionally, the presence of the 'exam' directory, which may be overlooked during security audits, can serve as an unnoticed entry point for attackers. The potential for lateral movement and persistence within networks following initial exploitation further elevates the threat to European enterprises. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
European organizations should take immediate and specific actions to mitigate CVE-2025-15067: 1) Conduct a thorough audit of all Innorix WP installations to identify the presence of the 'exam' directory and remove it if not required. 2) Implement strict file upload validation controls that restrict file types and enforce content inspection to prevent web shell uploads. 3) Apply the principle of least privilege to the web server and application directories, limiting write permissions to only necessary locations. 4) Monitor web server logs and file system changes for unusual upload activity or the presence of suspicious files. 5) Employ web application firewalls (WAFs) with rules designed to detect and block web shell signatures and malicious upload attempts. 6) Isolate Innorix WP instances in segmented network zones to limit lateral movement if compromise occurs. 7) Engage with Innorix for patches or official guidance and apply updates promptly once available. 8) Educate system administrators about this vulnerability and the importance of securing upload directories. These measures go beyond generic advice by focusing on the specific conditions and exploitation vectors of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- FSI
- Date Reserved
- 2025-12-24T04:53:23.307Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b5db813ff03e2bf282
Added to database: 12/30/2025, 10:22:45 PM
Last enriched: 12/30/2025, 11:23:43 PM
Last updated: 2/7/2026, 7:42:00 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.