Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15426: Unrestricted Upload in jackying H-ui.admin

0
Medium
VulnerabilityCVE-2025-15426cvecve-2025-15426
Published: Fri Jan 02 2026 (01/02/2026, 03:32:05 UTC)
Source: CVE Database V5
Vendor/Project: jackying
Product: H-ui.admin

Description

A vulnerability was identified in jackying H-ui.admin up to 3.1. This affects an unknown function in the library /lib/webuploader/0.1.5/server/preview.php. The manipulation leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/02/2026, 04:13:47 UTC

Technical Analysis

CVE-2025-15426 is a vulnerability discovered in the jackying H-ui.admin web administration framework, specifically affecting versions 3.0 and 3.1. The flaw resides in the /lib/webuploader/0.1.5/server/preview.php script, which handles file uploads. Due to insufficient validation or restrictions on uploaded files, attackers can perform unrestricted uploads remotely without any authentication or user interaction. This enables adversaries to upload malicious files such as web shells or scripts, which can be executed on the server, potentially leading to full system compromise, data leakage, or pivoting within the network. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with attack vector being network-based, low attack complexity, and no privileges or user interaction required. The vendor was notified but has not issued any patches or advisories, and while no active exploitation has been reported, a public exploit code is available, increasing the risk of future attacks. The lack of patching and vendor response heightens the urgency for affected organizations to implement compensating controls. This vulnerability is particularly critical for environments where H-ui.admin is exposed to the internet or untrusted networks, as it can be exploited remotely with minimal effort.

Potential Impact

For European organizations, exploitation of CVE-2025-15426 could lead to unauthorized remote code execution, allowing attackers to gain control over administrative web servers running H-ui.admin. This can result in data breaches, defacement, disruption of administrative functions, and lateral movement within corporate networks. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on H-ui.admin for internal or external administration face increased risks of operational disruption and reputational damage. The medium severity rating reflects the moderate but significant impact on confidentiality, integrity, and availability. Since no authentication is required, any exposed instance is vulnerable to automated attacks, increasing the likelihood of compromise. The absence of vendor patches means organizations must rely on internal mitigations, increasing operational overhead and risk exposure. European data protection regulations such as GDPR may impose additional legal and financial consequences if personal data is compromised due to this vulnerability.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict file upload validation and filtering on the affected endpoint, restricting allowed file types, sizes, and content. Deploy web application firewalls (WAFs) with custom rules to detect and block malicious upload attempts targeting /lib/webuploader/0.1.5/server/preview.php. Limit network exposure of H-ui.admin interfaces by restricting access to trusted IP addresses or via VPNs. Conduct thorough logging and monitoring of upload activity to detect suspicious behavior early. Consider temporarily disabling or isolating the vulnerable upload functionality if feasible. Regularly scan systems for web shells or unauthorized files that may have been uploaded. Engage in threat hunting exercises focused on this vulnerability. Maintain up-to-date backups to enable recovery in case of compromise. Finally, monitor vendor channels for any forthcoming patches or advisories and plan for immediate deployment once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T11:15:51.284Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69574277db813ff03ec73231

Added to database: 1/2/2026, 3:58:47 AM

Last enriched: 1/2/2026, 4:13:47 AM

Last updated: 1/8/2026, 7:25:07 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats