Cyber Posture

CVE-2025-15422

MediumPublic PoC

Published: 02 January 2026

Published
02 January 2026
Modified
07 January 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0027 50.0th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15422 is a medium-severity Protection Mechanism Failure (CWE-693) vulnerability in Phome Empirecms. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 50.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-693

Implements a reliable, tamperproof protection mechanism whose completeness can be assured.

addresses: CWE-693

Procedures for training on protection mechanisms reduce the chance of protection mechanism failures being present or exploitable.

addresses: CWE-693

Documented procedures to implement assessment, authorization, and monitoring controls prevent these protection mechanisms from failing due to undefined processes.

addresses: CWE-693

Direct evaluation of whether controls produce desired security outcomes detects protection mechanism failures and enables remediation.

addresses: CWE-693

Requires assessment that protection mechanisms are correctly implemented and producing intended security outcomes.

addresses: CWE-693

The POA&M process ensures identified weaknesses in protection mechanisms are documented and scheduled for remediation, reducing the duration they remain exploitable.

addresses: CWE-693

Ongoing control assessments and analysis of monitoring data enable timely detection and response when protection mechanisms fail.

addresses: CWE-693

Impact analysis identifies changes that could weaken or disable existing protection mechanisms.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct remote unauthenticated exploit of public-facing CMS IP handler component (protection bypass).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw has been found in EmpireSoft EmpireCMS up to 8.0. This issue affects the function egetip of the file e/class/connect.php of the component IP Address Handler. This manipulation causes protection mechanism failure. The attack may be initiated remotely. The…

more

exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-15422 is a vulnerability in EmpireSoft EmpireCMS versions up to 8.0, affecting the "egetip" function in the file e/class/connect.php within the IP Address Handler component. This flaw results in a protection mechanism failure, mapped to CWE-693. Published on 2026-01-02, it carries a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), indicating medium severity with network accessibility, low attack complexity, no privileges or user interaction required, and limited impact to integrity.

Unauthenticated remote attackers can exploit this vulnerability by manipulating the IP Address Handler, leading to failure of protection mechanisms. Exploitation requires no privileges and can be performed over the network with low complexity, potentially allowing integrity violations such as improper IP handling or bypassing related safeguards.

Advisories referenced in VulDB entries (ctiid.339344, id.339344, submit.721344) and a proof-of-concept at note-hxlab.wetolink.com detail the issue, confirming remote exploitability. The vendor was contacted early but provided no response, and no patches or official mitigations are mentioned.

A public exploit has been published and may be used in attacks.

Details

CWE(s)

Affected Products

phome
empirecms
≤ 8.0

CVEs Like This One

CVE-2025-15423Same product: Phome Empirecms
CVE-2026-41316Shared CWE-693
CVE-2025-27665Shared CWE-693
CVE-2025-40536Shared CWE-693
CVE-2026-22753Shared CWE-693
CVE-2025-43728Shared CWE-693
CVE-2024-55024Shared CWE-693
CVE-2025-48626Shared CWE-693
CVE-2026-34938Shared CWE-693
CVE-2026-26956Shared CWE-693

References