CVE-2025-15422

MEDIUM5.5/ 10.0
Share:
Published: January 2, 2026 at 02:15 AM
Modified: January 7, 2026 at 09:57 PM
Source: cna@vuldb.com

Vulnerability Description

A flaw has been found in EmpireSoft EmpireCMS up to 8.0. This issue affects the function egetip of the file e/class/connect.php of the component IP Address Handler. This manipulation causes protection mechanism failure. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics

Base Score
5.5
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com

AI Security Analysis

01 // Technical Summary

EmpireCMS versions up to 8.0 are vulnerable to a remote protection mechanism failure due to a flaw in the egetip function within e/class/connect.php. This allows attackers to bypass security measures and potentially gain unauthorized access. The vulnerability is remotely exploitable and a public exploit is available, posing a significant risk to affected systems.

02 // Vulnerability Mechanism

Step 1: Target Identification: The attacker identifies a vulnerable EmpireCMS installation (version 8.0 or below).

Step 2: Exploit Trigger: The attacker crafts a malicious request designed to exploit the egetip function.

Step 3: Protection Mechanism Bypass: The crafted request bypasses the intended security measures, such as IP address filtering or access controls.

Step 4: Unauthorized Access/Action: The attacker leverages the bypassed protection to perform unauthorized actions, potentially including data exfiltration, privilege escalation, or system compromise.

03 // Deep Technical Analysis

The vulnerability lies within the egetip function in e/class/connect.php. This function is responsible for handling IP address information. The specific flaw involves a failure in the protection mechanism, likely related to how the function validates or processes IP addresses. This could manifest as a bypass of IP-based access controls, rate limiting, or other security features designed to prevent malicious activity. The lack of vendor response suggests a potential lack of security awareness or resources, exacerbating the risk. The root cause is likely an improper implementation of IP address handling, leading to a vulnerability that allows attackers to circumvent security measures.

CVE-2025-15422 - MEDIUM Severity (5.5) | Free CVE Database | 4nuxd