CVE-2025-15067

7.7 HIGH

📋 TL;DR

This vulnerability allows attackers to upload malicious files to web servers running Innorix WP, potentially leading to remote code execution. All versions of Innorix WP are affected if the 'exam' directory exists in the installation path. This impacts organizations using this software for web content management.

💻 Affected Systems

Products:
  • Innorix WP
Versions: All versions
Operating Systems: All operating systems where Innorix WP is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires the 'exam' directory to exist under the Innorix WP installation directory (e.g., innorix/exam).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via web shell leading to data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized file upload resulting in web shell deployment and limited server access for malicious activities.

🟢

If Mitigated

File upload attempts blocked or detected before successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

File upload vulnerabilities are commonly exploited with minimal technical skill using readily available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check vendor websites (gnit.co.kr, innorix.com) for updates and apply immediately when released.

🔧 Temporary Workarounds

Remove or Secure Exam Directory

all

Delete or restrict access to the vulnerable 'exam' directory to prevent exploitation.

rm -rf /path/to/innorix/exam
chmod 000 /path/to/innorix/exam

Implement File Upload Restrictions

all

Configure web server or application to block dangerous file types and validate uploads.

🧯 If You Can't Patch

  • Remove or rename the 'exam' directory from the Innorix WP installation path
  • Implement strict file upload validation and WAF rules to block malicious file types

🔍 How to Verify

Check if Vulnerable:

Check if the 'exam' directory exists in the Innorix WP installation directory (e.g., ls -la /path/to/innorix/exam).

Check Version:

Check Innorix WP documentation or configuration files for version information.

Verify Fix Applied:

Confirm the 'exam' directory no longer exists or has restricted permissions (e.g., ls -la /path/to/innorix/exam).

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to exam directory
  • POST requests with suspicious file extensions (.php, .jsp, .asp)

Network Indicators:

  • HTTP requests to exam directory with file upload parameters
  • Unusual outbound connections from web server

SIEM Query:

source="web_server" AND (uri="*exam*" AND method="POST" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp"))

🔗 References

📤 Share & Export