Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15423: Unrestricted Upload in EmpireSoft EmpireCMS

0
Medium
VulnerabilityCVE-2025-15423cvecve-2025-15423
Published: Fri Jan 02 2026 (01/02/2026, 02:02:09 UTC)
Source: CVE Database V5
Vendor/Project: EmpireSoft
Product: EmpireCMS

Description

A vulnerability has been found in EmpireSoft EmpireCMS up to 8.0. Impacted is the function CheckSaveTranFiletype of the file e/class/connect.php. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:17:40 UTC

Technical Analysis

CVE-2025-15423 is a vulnerability identified in EmpireSoft's EmpireCMS product, specifically affecting version 8.0. The issue resides in the CheckSaveTranFiletype function within the file e/class/connect.php, which fails to properly validate uploaded files, allowing attackers to perform unrestricted file uploads. This vulnerability can be exploited remotely without user interaction and with low attack complexity, although it requires limited privileges on the system. The unrestricted upload capability can be leveraged to upload malicious scripts or web shells, potentially leading to remote code execution, website defacement, data exfiltration, or further compromise of the underlying server. The vulnerability has been publicly disclosed, but the vendor has not responded or released patches, increasing the urgency for organizations to implement alternative mitigations. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation and potential impact on confidentiality, integrity, and availability. The vulnerability does not require user interaction and affects a widely used content management system, making it a significant concern for organizations relying on EmpireCMS for web content delivery.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. EmpireCMS is used by various enterprises and government entities for managing web content, so exploitation could lead to unauthorized access to sensitive data, website defacement, or disruption of online services. Attackers could deploy web shells to maintain persistent access, facilitating further attacks such as data theft, ransomware deployment, or lateral movement within networks. The lack of vendor patches increases the risk exposure, especially for organizations that cannot quickly migrate or replace the CMS. Additionally, compromised websites can damage organizational reputation and lead to regulatory penalties under GDPR if personal data is exposed. The medium severity rating suggests moderate but tangible risks to confidentiality, integrity, and availability, particularly for organizations with public-facing web infrastructure running EmpireCMS 8.0.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately restrict file upload permissions on the web server to the minimum necessary, ideally disabling uploads if not required. 2) Deploy a web application firewall (WAF) with custom rules to detect and block suspicious file upload attempts targeting the vulnerable function. 3) Conduct thorough code reviews and implement custom validation to restrict allowed file types and sanitize file names in the upload process. 4) Monitor web server logs and file system changes for indicators of compromise, such as unexpected file uploads or execution of unknown scripts. 5) Isolate the CMS environment using network segmentation to limit potential lateral movement if compromised. 6) Plan for migration to a patched or alternative CMS solution as a long-term remediation. 7) Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving web shell detection and removal.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T11:09:50.733Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695843a1db813ff03e04a595

Added to database: 1/2/2026, 10:16:01 PM

Last enriched: 1/2/2026, 10:17:40 PM

Last updated: 1/7/2026, 4:00:17 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats