Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15109: Unrestricted Upload in jackq XCMS

0
Medium
VulnerabilityCVE-2025-15109cvecve-2025-15109
Published: Sat Dec 27 2025 (12/27/2025, 18:32:08 UTC)
Source: CVE Database V5
Vendor/Project: jackq
Product: XCMS

Description

A flaw has been found in jackq XCMS up to 3fab5342cc509945a7ce1b8ec39d19f701b89261. This impacts an unknown function of the file Public/javascripts/admin/plupload-2.1.2/examples/upload.php. This manipulation causes unrestricted upload. It is possible to initiate the attack remotely. The exploit has been published and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:30:16 UTC

Technical Analysis

CVE-2025-15109 identifies an unrestricted file upload vulnerability in jackq XCMS, specifically within the file Public/javascripts/admin/plupload-2.1.2/examples/upload.php. The vulnerability arises because the upload.php script does not properly restrict or validate uploaded files, allowing an attacker to remotely upload arbitrary files without requiring authentication or user interaction. This can lead to remote code execution or unauthorized system access if malicious files such as web shells are uploaded and executed. The vulnerability affects the codebase up to commit 3fab5342cc509945a7ce1b8ec39d19f701b89261. jackq XCMS employs a rolling release model, meaning continuous delivery without fixed version numbers, which complicates identifying affected versions and applying patches. The vendor has been notified but has not yet issued a fix or response. The CVSS v4.0 base score is 6.9 (medium), reflecting network attack vector, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. While no active exploitation has been confirmed, a public exploit is available, increasing the urgency for mitigation. The vulnerability leverages a common web application weakness—unrestricted file upload—often exploited to gain persistent unauthorized access or execute arbitrary code on the server.

Potential Impact

The unrestricted upload vulnerability in jackq XCMS can have significant impacts on organizations using this CMS. Attackers can remotely upload malicious files such as web shells or scripts, enabling them to execute arbitrary code, escalate privileges, or move laterally within the network. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially disrupting services. Since no authentication or user interaction is required, exploitation is straightforward, increasing risk. Organizations relying on jackq XCMS for web content management may face website defacement, data breaches, or full system compromise. The rolling release model and lack of vendor response increase exposure duration. Additionally, the presence of a public exploit raises the likelihood of opportunistic attacks. Overall, this vulnerability threatens the security posture of affected organizations, especially those with internet-facing XCMS deployments.

Mitigation Recommendations

To mitigate CVE-2025-15109, organizations should first identify all instances of jackq XCMS in their environment, focusing on those exposing the vulnerable upload.php endpoint. Since no official patch is currently available, immediate mitigations include: 1) Restrict access to the upload.php script via web server configuration or firewall rules to trusted IPs only. 2) Implement strict input validation and file type restrictions on uploaded files, allowing only necessary file types and rejecting all others. 3) Employ web application firewalls (WAFs) with rules to detect and block malicious upload attempts targeting plupload or upload.php. 4) Monitor logs for suspicious upload activity or unexpected file creations in web directories. 5) If feasible, temporarily disable or remove the vulnerable upload functionality until a vendor patch is released. 6) Follow the jackq project closely for updates or patches and apply them promptly once available. 7) Conduct regular security assessments and penetration tests to detect any exploitation attempts. These targeted actions go beyond generic advice by focusing on access control, input validation, and proactive monitoring specific to the vulnerable component.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-26T23:14:13.733Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450bbdb813ff03e2bf81e

Added to database: 12/30/2025, 10:22:51 PM

Last enriched: 2/24/2026, 10:30:16 PM

Last updated: 3/25/2026, 2:18:52 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses