CVE-2025-15132

Source
https://cve.org/CVERecord?id=CVE-2025-15132
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15132.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15132
Published
2025-12-28T11:15:40.063Z
Modified
2026-03-15T22:51:02.403187Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was determined in ZSPACE Z4Pro+ 1.0.0440024. The affected element is the function zfilev2apiopen of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15132.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "1.0.0440024"
            }
        ]
    }
]