Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15426: Unrestricted Upload in jackying H-ui.admin

0
Medium
VulnerabilityCVE-2025-15426cvecve-2025-15426
Published: Fri Jan 02 2026 (01/02/2026, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: jackying
Product: H-ui.admin

Description

A vulnerability was identified in jackying H-ui.admin up to 3.1. This affects an unknown function in the library /lib/webuploader/0.1.5/server/preview.php. The manipulation leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:01:31 UTC

Technical Analysis

CVE-2025-15426 is a security vulnerability identified in the jackying H-ui.admin web administration framework, specifically affecting versions 3.0 and 3.1. The vulnerability resides in the file upload functionality implemented in /lib/webuploader/0.1.5/server/preview.php, which fails to properly restrict or validate uploaded files. This unrestricted upload flaw enables remote attackers to upload arbitrary files, including potentially malicious scripts, without requiring authentication or user interaction. Exploitation can lead to remote code execution or server compromise if attackers upload web shells or other malicious payloads. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required. The CVSS 4.0 vector indicates no user interaction and no privileges needed, with low impact on confidentiality, integrity, and availability individually but combined can lead to significant compromise. Despite early vendor notification, no patches or official fixes have been released, and a public exploit is available, increasing the urgency for defensive measures. The vulnerability affects a widely used admin panel framework, which may be deployed in various organizational environments, making it a notable risk for web infrastructure security.

Potential Impact

The unrestricted upload vulnerability in H-ui.admin can have severe consequences for organizations using affected versions. Attackers can upload malicious files such as web shells or scripts, enabling remote code execution, data theft, or full server compromise. This can lead to unauthorized access to sensitive data, disruption of services, and lateral movement within internal networks. Since the vulnerability requires no authentication or user interaction, it can be exploited by any remote attacker scanning for vulnerable instances. The lack of vendor response and absence of patches increases the window of exposure. Organizations relying on H-ui.admin for administrative interfaces are at risk of targeted attacks, especially if the admin panel is exposed to the internet. The medium CVSS score reflects the moderate but real risk, with potential for escalation depending on the payload and environment. Overall, this vulnerability threatens confidentiality, integrity, and availability of affected systems and data.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the H-ui.admin interface using network-level controls such as IP whitelisting, VPNs, or firewall rules to limit exposure to trusted users only. Second, implement web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts, especially targeting the /lib/webuploader/0.1.5/server/preview.php endpoint. Third, conduct thorough monitoring and logging of file uploads and server activity to detect anomalous behavior or unauthorized files. Fourth, consider disabling or removing the vulnerable upload functionality if feasible until a patch is available. Fifth, perform regular security audits and vulnerability scans to identify exposed instances. Finally, maintain backups and prepare incident response plans to quickly recover from potential compromises. Organizations should also track vendor communications for any future patches or updates and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T11:15:51.284Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69574277db813ff03ec73231

Added to database: 1/2/2026, 3:58:47 AM

Last enriched: 2/23/2026, 11:01:31 PM

Last updated: 3/24/2026, 1:16:41 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses