Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15110: Unrestricted Upload in jackq XCMS

0
Medium
VulnerabilityCVE-2025-15110cvecve-2025-15110
Published: Sat Dec 27 2025 (12/27/2025, 20:02:09 UTC)
Source: CVE Database V5
Vendor/Project: jackq
Product: XCMS

Description

A vulnerability has been found in jackq XCMS up to 3fab5342cc509945a7ce1b8ec39d19f701b89261. Affected is the function Upload of the file Admin/Home/Controller/ProductImageController.class.php of the component Backend. Such manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:25:19 UTC

Technical Analysis

CVE-2025-15110 is a vulnerability identified in the jackq XCMS content management system, specifically in the Upload function of the ProductImageController.class.php file within the backend component. The vulnerability arises from insufficient validation or restrictions on the 'File' argument, allowing an attacker to perform unrestricted file uploads remotely. This means an attacker can upload arbitrary files, including potentially malicious scripts, to the server without requiring user interaction or authentication, although the CVSS vector indicates a requirement for high privileges (PR:H). The vulnerability affects the version identified by the commit hash 3fab5342cc509945a7ce1b8ec39d19f701b89261. Due to the rolling release nature of the product, no fixed version or patch has been officially released yet, and the vendor has not responded to the issue report. The CVSS 4.0 score of 5.1 (medium severity) reflects network attack vector, low complexity, no user interaction, but requiring high privileges. The impact on confidentiality, integrity, and availability is low to limited but can lead to significant consequences if exploited to upload web shells or malware. Although no known exploits are currently active in the wild, public disclosure increases the risk of exploitation attempts. The vulnerability is critical for environments where jackq XCMS is used to manage web content, especially if the backend is accessible externally or insufficiently protected. Attackers could leverage this flaw to gain unauthorized access, execute arbitrary code, or disrupt services.

Potential Impact

For European organizations using jackq XCMS, this vulnerability poses a risk of unauthorized file uploads that could lead to remote code execution, data breaches, or service disruptions. Organizations with publicly accessible backend interfaces are particularly vulnerable, as attackers can exploit the flaw remotely. The impact on confidentiality includes potential exposure of sensitive data if attackers upload scripts to exfiltrate information. Integrity may be compromised through unauthorized modification or insertion of malicious content. Availability could be affected if attackers deploy denial-of-service payloads or ransomware. Given the medium severity and the requirement for high privileges, the threat is more pronounced in environments where internal users or compromised accounts have backend access. The lack of an official patch increases the window of exposure. European sectors relying on jackq XCMS for e-commerce, government portals, or critical infrastructure web services could face operational and reputational damage if exploited.

Mitigation Recommendations

1. Implement strict server-side validation of uploaded files, including checking file types, sizes, and content signatures to prevent malicious uploads. 2. Restrict upload permissions to only trusted and authenticated users with the minimum necessary privileges. 3. Employ web application firewalls (WAF) with rules to detect and block suspicious upload attempts or payloads. 4. Isolate the upload directory with limited execution permissions to prevent uploaded files from being executed as code. 5. Monitor logs and file system changes for unusual activity related to file uploads. 6. If possible, temporarily disable the upload functionality or restrict backend access to trusted IP addresses until a patch is available. 7. Engage with the vendor or community to track updates or patches addressing this vulnerability. 8. Conduct regular security audits and penetration testing focusing on file upload mechanisms. 9. Educate internal users about the risks of privilege misuse and enforce strong authentication and access controls. 10. Consider deploying intrusion detection systems (IDS) to alert on anomalous backend activity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-26T23:14:21.062Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b6db813ff03e2bf305

Added to database: 12/30/2025, 10:22:46 PM

Last enriched: 12/30/2025, 11:25:19 PM

Last updated: 2/7/2026, 6:15:22 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats