Cyber Posture

CVE-2025-15132

MediumPublic PoCUpdated

Published: 28 December 2025

Published
28 December 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0043 62.8th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15132 is a medium-severity Injection (CWE-74) vulnerability in Zspace Z4Pro\+ Firmware. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 37.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by requiring validation and error handling of HTTP POST inputs to the vulnerable zfilev2_api_open endpoint.

prevent

Mandates timely identification, reporting, and correction of the specific command injection flaw in ZSPACE Z4Pro+ version 1.0.0440024.

preventdetect

Enforces boundary protection to monitor and filter malicious HTTP POST requests targeting the /v2/file/safe/open endpoint, blocking injection attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection in public-facing HTTP endpoint enables exploitation of public-facing application (T1190) and arbitrary command execution via system interpreters (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability was determined in ZSPACE Z4Pro+ 1.0.0440024. The affected element is the function zfilev2_api_open of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation causes command injection. It is possible to initiate the attack remotely. The…

more

exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure.

Deeper analysisAI

CVE-2025-15132 is a command injection vulnerability affecting ZSPACE Z4Pro+ version 1.0.0440024. The flaw resides in the zfilev2_api_open function within the /v2/file/safe/open endpoint of the HTTP POST Request Handler component. It is associated with CWEs-74 and CWE-77 and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

An attacker can exploit this vulnerability remotely by manipulating HTTP POST requests to the affected endpoint, provided they possess low privileges. Exploitation requires low complexity and no user interaction, enabling limited impacts on confidentiality, integrity, and availability. A proof-of-concept exploit has been publicly disclosed and may be utilized.

Advisories provide further details via references such as https://github.com/LX-66-LX/cve/issues/2, https://vuldb.com/?ctiid.338510, https://vuldb.com/?id.338510, and https://vuldb.com/?submit.713885. The vendor was contacted early about the disclosure, published on 2025-12-28.

Details

CWE(s)

Affected Products

zspace
z4pro\+ firmware
≤ 1.0.0440024

CVEs Like This One

CVE-2025-15133Same product: Zspace Z4Pro\+
CVE-2025-15131Same product: Zspace Z4Pro\+
CVE-2025-14106Same vendor: Zspace
CVE-2025-14107Same vendor: Zspace
CVE-2025-14108Same vendor: Zspace
CVE-2026-8344Shared CWE-74, CWE-77
CVE-2025-1947Shared CWE-74, CWE-77
CVE-2025-1946Shared CWE-74, CWE-77
CVE-2025-10962Shared CWE-74, CWE-77
CVE-2025-0328Shared CWE-74, CWE-77

References