CVE-2025-15135

Source
https://cve.org/CVERecord?id=CVE-2025-15135
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15135.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15135
Published
2025-12-28T12:15:41.310Z
Modified
2026-03-15T22:50:24.511983Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

A weakness has been identified in joey-zhou xiaozhi-esp32-server-java up to 3.0.0. This impacts the function tryAuthenticateWithCookies of the file AuthenticationInterceptor.java of the component Cookie Handler. Executing manipulation can lead to improper authentication. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. Upgrading to version 4.0.0 will fix this issue. It is recommended to upgrade the affected component.

References

Affected packages

Git / github.com/joey-zhou/xiaozhi-esp32-server-java

Affected ranges

Type
GIT
Repo
https://github.com/joey-zhou/xiaozhi-esp32-server-java
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*
v2.7.57
v2.7.60
v2.7.61
v2.7.62
v2.7.64
v2.7.65
v2.8.0
v2.8.1
v2.8.10
v2.8.11
v2.8.12
v2.8.13
v2.8.14
v2.8.17
v2.8.18
v2.8.2
v2.8.3
v2.8.4
v2.8.5
v2.8.7
v2.8.8
v2.8.9
v3.*
v3.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15135.json"