CVE-2025-15152: Unrestricted Upload in h-moses moga-mall
A vulnerability was identified in h-moses moga-mall up to 392d631a5ef15962a9bddeeb9f1269b9085473fa. This vulnerability affects the function addProduct of the file src/main/java/com/ms/product/controller/PmsProductController.java. Such manipulation of the argument objectName leads to unrestricted upload. The attack may be performed from remote. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed.
AI Analysis
Technical Summary
CVE-2025-15152 is a vulnerability discovered in the h-moses moga-mall e-commerce platform, affecting versions up to commit 392d631a5ef15962a9bddeeb9f1269b9085473fa. The vulnerability resides in the addProduct function within the PmsProductController.java source file. Specifically, the issue arises from improper handling of the objectName argument, which allows an attacker to perform unrestricted file uploads remotely. Because the platform uses a rolling release system for continuous delivery, specific patched versions are not disclosed, complicating version tracking. The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit. Successful exploitation could allow attackers to upload arbitrary files, potentially leading to remote code execution, data leakage, or service disruption. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, though the scope is limited to the affected moga-mall installations. No known exploits have been reported in the wild yet, but the risk remains significant due to the nature of unrestricted upload vulnerabilities in web applications.
Potential Impact
For European organizations using the h-moses moga-mall platform, this vulnerability poses a risk of unauthorized file uploads that could lead to webshell deployment, data exfiltration, defacement, or denial of service. E-commerce platforms are critical infrastructure for retail and supply chains, so exploitation could disrupt business operations and damage brand reputation. Confidential customer data and transaction information could be exposed or manipulated, violating GDPR and other data protection regulations, potentially resulting in legal and financial penalties. The remote, unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially by opportunistic attackers scanning for vulnerable instances. Organizations relying on moga-mall for online sales in Europe must consider the potential for targeted attacks, especially in countries with large e-commerce markets or where h-moses has significant market penetration. The continuous delivery model complicates patch management, requiring vigilant monitoring and rapid response to updates.
Mitigation Recommendations
1. Implement strict server-side validation of the objectName parameter to ensure only allowed file names and extensions are accepted. 2. Enforce file type restrictions by validating MIME types and using allowlists for permitted file formats. 3. Limit file upload size to prevent resource exhaustion attacks. 4. Employ authentication and authorization checks on upload endpoints to restrict access to trusted users only. 5. Use sandboxing or isolated storage locations for uploaded files to prevent execution of malicious code. 6. Monitor upload activity and logs for unusual patterns indicative of exploitation attempts. 7. Apply web application firewalls (WAFs) with rules targeting unrestricted upload attempts. 8. Stay updated with h-moses releases and security advisories despite the rolling release model, and test updates in staging environments before production deployment. 9. Conduct regular security assessments and penetration testing focusing on file upload functionalities. 10. Educate development teams on secure coding practices related to file handling.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-15152: Unrestricted Upload in h-moses moga-mall
Description
A vulnerability was identified in h-moses moga-mall up to 392d631a5ef15962a9bddeeb9f1269b9085473fa. This vulnerability affects the function addProduct of the file src/main/java/com/ms/product/controller/PmsProductController.java. Such manipulation of the argument objectName leads to unrestricted upload. The attack may be performed from remote. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed.
AI-Powered Analysis
Technical Analysis
CVE-2025-15152 is a vulnerability discovered in the h-moses moga-mall e-commerce platform, affecting versions up to commit 392d631a5ef15962a9bddeeb9f1269b9085473fa. The vulnerability resides in the addProduct function within the PmsProductController.java source file. Specifically, the issue arises from improper handling of the objectName argument, which allows an attacker to perform unrestricted file uploads remotely. Because the platform uses a rolling release system for continuous delivery, specific patched versions are not disclosed, complicating version tracking. The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit. Successful exploitation could allow attackers to upload arbitrary files, potentially leading to remote code execution, data leakage, or service disruption. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, though the scope is limited to the affected moga-mall installations. No known exploits have been reported in the wild yet, but the risk remains significant due to the nature of unrestricted upload vulnerabilities in web applications.
Potential Impact
For European organizations using the h-moses moga-mall platform, this vulnerability poses a risk of unauthorized file uploads that could lead to webshell deployment, data exfiltration, defacement, or denial of service. E-commerce platforms are critical infrastructure for retail and supply chains, so exploitation could disrupt business operations and damage brand reputation. Confidential customer data and transaction information could be exposed or manipulated, violating GDPR and other data protection regulations, potentially resulting in legal and financial penalties. The remote, unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially by opportunistic attackers scanning for vulnerable instances. Organizations relying on moga-mall for online sales in Europe must consider the potential for targeted attacks, especially in countries with large e-commerce markets or where h-moses has significant market penetration. The continuous delivery model complicates patch management, requiring vigilant monitoring and rapid response to updates.
Mitigation Recommendations
1. Implement strict server-side validation of the objectName parameter to ensure only allowed file names and extensions are accepted. 2. Enforce file type restrictions by validating MIME types and using allowlists for permitted file formats. 3. Limit file upload size to prevent resource exhaustion attacks. 4. Employ authentication and authorization checks on upload endpoints to restrict access to trusted users only. 5. Use sandboxing or isolated storage locations for uploaded files to prevent execution of malicious code. 6. Monitor upload activity and logs for unusual patterns indicative of exploitation attempts. 7. Apply web application firewalls (WAFs) with rules targeting unrestricted upload attempts. 8. Stay updated with h-moses releases and security advisories despite the rolling release model, and test updates in staging environments before production deployment. 9. Conduct regular security assessments and penetration testing focusing on file upload functionalities. 10. Educate development teams on secure coding practices related to file handling.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T13:59:48.412Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bcdb813ff03e2bf878
Added to database: 12/30/2025, 10:22:52 PM
Last enriched: 12/30/2025, 11:45:50 PM
Last updated: 2/7/2026, 6:11:26 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.