CVE-2025-15226

9.8 CRITICAL

📋 TL;DR

WMPro software from Sunnet contains an unauthenticated arbitrary file upload vulnerability that allows remote attackers to upload malicious files (like web shells) and execute arbitrary code on affected servers. This affects all systems running vulnerable versions of WMPro without proper security controls. Attackers can completely compromise servers without requiring any authentication.

💻 Affected Systems

Products:
  • Sunnet WMPro
Versions: All versions prior to the security patch
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with file upload functionality enabled; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with administrative privileges, data exfiltration, ransomware deployment, and use as pivot point for lateral movement within the network.

🟠

Likely Case

Web shell installation leading to data theft, cryptocurrency mining, or botnet recruitment.

🟢

If Mitigated

Attack blocked at network perimeter or web application firewall; no successful exploitation.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing systems immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST requests with malicious file uploads are sufficient for exploitation; no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest security update from Sunnet

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10603-67149-2.html

Restart Required: Yes

Instructions:

1. Contact Sunnet for the latest security patch. 2. Apply the patch to all WMPro installations. 3. Restart the WMPro service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Block file uploads to WMPro endpoints and restrict file types

Network Segmentation

all

Restrict access to WMPro administration interfaces to trusted IPs only

🧯 If You Can't Patch

  • Disable WMPro file upload functionality completely
  • Implement strict file type validation and size limits on uploads

🔍 How to Verify

Check if Vulnerable:

Test if unauthenticated file upload is possible to WMPro endpoints; check version against known vulnerable releases.

Check Version:

Check WMPro administration panel or configuration files for version information

Verify Fix Applied:

Attempt to upload malicious files after patch application; verify uploads are properly validated and rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to WMPro endpoints
  • POST requests with executable file extensions
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests with suspicious file names (.php, .jsp, .asp extensions)
  • Traffic to known web shell paths

SIEM Query:

source="web_server" AND (uri_path="/wmpro/upload*" OR file_extension IN ("php", "jsp", "asp")) AND http_method="POST"

🔗 References

📤 Share & Export