Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15423: Unrestricted Upload in EmpireSoft EmpireCMS

0
Medium
VulnerabilityCVE-2025-15423cvecve-2025-15423
Published: Fri Jan 02 2026 (01/02/2026, 02:02:09 UTC)
Source: CVE Database V5
Vendor/Project: EmpireSoft
Product: EmpireCMS

Description

A vulnerability has been found in EmpireSoft EmpireCMS up to 8.0. Impacted is the function CheckSaveTranFiletype of the file e/class/connect.php. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/10/2026, 00:05:58 UTC

Technical Analysis

CVE-2025-15423 is a vulnerability identified in EmpireSoft's EmpireCMS product, specifically affecting version 8.0 and earlier. The issue resides in the CheckSaveTranFiletype function within the e/class/connect.php file, which is responsible for validating uploaded files. Due to insufficient validation, attackers can perform unrestricted file uploads, allowing them to upload malicious files such as web shells or scripts. This vulnerability can be exploited remotely without requiring user interaction or elevated privileges, although low-level privileges on the CMS are necessary. The lack of proper file type checks means attackers can bypass restrictions and upload executable code, potentially leading to remote code execution, website defacement, or pivoting within the victim's network. The vulnerability was publicly disclosed on January 2, 2026, with no vendor response or patch available at the time of disclosure. The CVSS 4.0 base score is 5.3, reflecting medium severity, with attack vector network, low attack complexity, no privileges required, and no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability to a limited extent but poses a significant risk due to the potential for remote exploitation and system compromise. No known exploits are currently observed in the wild, but the public disclosure increases the risk of exploitation attempts.

Potential Impact

For European organizations using EmpireCMS 8.0, this vulnerability poses a tangible risk of unauthorized access and control over web servers hosting critical content or services. Exploitation could lead to website defacement, data leakage, insertion of malicious content, or use of compromised servers as a foothold for further attacks within the corporate network. Organizations in sectors such as government, finance, healthcare, and media, which rely on EmpireCMS for content management, may face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The medium severity score indicates moderate impact, but the ease of remote exploitation without user interaction increases urgency. Additionally, the lack of vendor response and patch availability heightens exposure, necessitating immediate compensating controls. The threat landscape in Europe, with increasing cyber espionage and ransomware activity, means attackers may leverage this vulnerability to gain initial access or persistence.

Mitigation Recommendations

1. Immediately restrict file upload permissions on the web server to the minimum necessary, ideally disabling uploads if not required. 2. Implement strict server-side validation of uploaded files, including MIME type checks, file extension whitelisting, and content inspection to block executable or script files. 3. Use web application firewalls (WAFs) to detect and block suspicious upload attempts targeting the vulnerable function. 4. Monitor web server logs for unusual file upload activity or access patterns indicative of exploitation attempts. 5. Isolate the CMS environment from critical internal networks to limit lateral movement if compromise occurs. 6. Apply virtual patching via WAF rules or custom scripts until an official patch is released. 7. Regularly backup website data and configurations to enable rapid recovery in case of compromise. 8. Engage with EmpireSoft or community forums to track patch releases or unofficial fixes. 9. Conduct penetration testing focused on file upload functionality to verify mitigations. 10. Educate administrators on secure CMS configuration and incident response procedures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T11:09:50.733Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695843a1db813ff03e04a595

Added to database: 1/2/2026, 10:16:01 PM

Last enriched: 1/10/2026, 12:05:58 AM

Last updated: 2/7/2026, 9:48:05 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats