CVE-2025-15129

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code through a file upload manipulation in ChenJinchuang Lin-CMS-TP5. Attackers can exploit the Upload function in LocalUploader.php to inject malicious code. Systems running Lin-CMS-TP5 version 0.3.3 or earlier are affected.

💻 Affected Systems

Products:
  • ChenJinchuang Lin-CMS-TP5
Versions: up to 0.3.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the file upload handler component; any system using the vulnerable upload function is at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell deployment leading to unauthorized access, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper file upload restrictions and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been published and may be used; remote execution capability makes this easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative CMS or implementing strict workarounds.

🔧 Temporary Workarounds

Disable File Upload Function

all

Temporarily disable the vulnerable upload handler until a patch is available.

Comment out or remove calls to LocalUploader.php upload function

Implement Strict File Validation

all

Add server-side validation for file types, extensions, and content before processing.

Implement whitelist validation for allowed file types and extensions

🧯 If You Can't Patch

  • Implement WAF rules to block malicious file upload patterns
  • Restrict network access to affected systems and monitor for suspicious upload activity

🔍 How to Verify

Check if Vulnerable:

Check if Lin-CMS-TP5 version is 0.3.3 or earlier and if LocalUploader.php is present in the codebase.

Check Version:

Check composer.json or project configuration files for version information

Verify Fix Applied:

Verify that file upload validation has been implemented and test with malicious upload attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Execution of unexpected PHP files
  • Access to LocalUploader.php with suspicious parameters

Network Indicators:

  • HTTP POST requests to upload endpoints with unusual file extensions
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND (uri="*upload*" OR uri="*LocalUploader*") AND (extension="php" OR extension="phtml" OR extension="phar")

🔗 References

📤 Share & Export