Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15495: Unrestricted Upload in BiggiDroid Simple PHP CMS

0
Medium
VulnerabilityCVE-2025-15495cvecve-2025-15495
Published: Fri Jan 09 2026 (01/09/2026, 17:02:09 UTC)
Source: CVE Database V5
Vendor/Project: BiggiDroid
Product: Simple PHP CMS

Description

A vulnerability was found in BiggiDroid Simple PHP CMS 1.0. This impacts an unknown function of the file /admin/editsite.php. The manipulation of the argument image results in unrestricted upload. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/09/2026, 17:24:54 UTC

Technical Analysis

CVE-2025-15495 is a vulnerability identified in BiggiDroid Simple PHP CMS version 1.0, specifically within the /admin/editsite.php file. The flaw arises from improper handling of the 'image' argument, which allows an attacker to perform unrestricted file uploads remotely. This means an attacker with high privileges can upload arbitrary files, potentially including web shells or malicious scripts, leading to unauthorized code execution or website defacement. The vulnerability does not require user interaction but does require authenticated access with elevated privileges, limiting exploitation to insiders or attackers who have already compromised credentials. The vendor was notified early but has not issued any patches or advisories, and no official remediation is currently available. Although no active exploitation has been reported, public exploit code has been released, increasing the likelihood of future attacks. The CVSS 4.0 score is 5.1 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability due to the need for authentication and the limited scope of the affected component. The vulnerability primarily threatens the web server hosting the CMS, potentially allowing attackers to upload malicious payloads, manipulate site content, or disrupt service. Organizations using this CMS should consider immediate mitigations and monitor for suspicious activity to prevent compromise.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites and web applications running BiggiDroid Simple PHP CMS version 1.0. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, deface websites, or disrupt service availability. This could result in reputational damage, data breaches, or service interruptions, especially for organizations relying on the CMS for public-facing or internal web portals. The requirement for high privileges limits the risk to attackers who have already gained some level of access, but insider threats or credential compromise could enable exploitation. The lack of vendor response and patches increases the window of exposure. Organizations in sectors with high web presence, such as media, education, or small-to-medium enterprises, may be particularly affected. Additionally, regulatory requirements under GDPR mandate prompt remediation of such vulnerabilities to avoid penalties. The impact on confidentiality, integrity, and availability is moderate but significant enough to warrant urgent attention.

Mitigation Recommendations

1. Restrict access to the /admin/editsite.php interface using network-level controls such as IP whitelisting or VPN-only access to limit exposure to trusted users. 2. Implement strict file upload validation on the server side, including checking file types, sizes, and content signatures to prevent malicious files from being uploaded. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the vulnerable parameter. 4. Monitor server logs and CMS activity for unusual file uploads or modifications, and establish alerting for potential exploitation indicators. 5. Enforce strong authentication and credential management practices to reduce the risk of privilege escalation or insider threats. 6. If possible, isolate the CMS environment to minimize impact in case of compromise. 7. Consider migrating to alternative CMS platforms or newer, supported versions if available, as no official patch exists. 8. Regularly back up website data and configurations to enable rapid recovery if exploitation occurs. 9. Engage in threat intelligence sharing with industry peers to stay informed about emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T11:36:37.798Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6961367d6c9099d823eb7ee4

Added to database: 1/9/2026, 5:10:21 PM

Last enriched: 1/9/2026, 5:24:54 PM

Last updated: 1/10/2026, 5:06:09 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats