CVE-2025-15132
Published: 28 December 2025
Summary
CVE-2025-15132 is a medium-severity Injection (CWE-74) vulnerability in Zspace Z4Pro\+ Firmware. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 37.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by requiring validation and error handling of HTTP POST inputs to the vulnerable zfilev2_api_open endpoint.
Mandates timely identification, reporting, and correction of the specific command injection flaw in ZSPACE Z4Pro+ version 1.0.0440024.
Enforces boundary protection to monitor and filter malicious HTTP POST requests targeting the /v2/file/safe/open endpoint, blocking injection attempts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public-facing HTTP endpoint enables exploitation of public-facing application (T1190) and arbitrary command execution via system interpreters (T1059).
NVD Description
A vulnerability was determined in ZSPACE Z4Pro+ 1.0.0440024. The affected element is the function zfilev2_api_open of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation causes command injection. It is possible to initiate the attack remotely. The…
more
exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure.
Deeper analysisAI
CVE-2025-15132 is a command injection vulnerability affecting ZSPACE Z4Pro+ version 1.0.0440024. The flaw resides in the zfilev2_api_open function within the /v2/file/safe/open endpoint of the HTTP POST Request Handler component. It is associated with CWEs-74 and CWE-77 and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
An attacker can exploit this vulnerability remotely by manipulating HTTP POST requests to the affected endpoint, provided they possess low privileges. Exploitation requires low complexity and no user interaction, enabling limited impacts on confidentiality, integrity, and availability. A proof-of-concept exploit has been publicly disclosed and may be utilized.
Advisories provide further details via references such as https://github.com/LX-66-LX/cve/issues/2, https://vuldb.com/?ctiid.338510, https://vuldb.com/?id.338510, and https://vuldb.com/?submit.713885. The vendor was contacted early about the disclosure, published on 2025-12-28.
Details
- CWE(s)