Cyber Posture

CVE-2025-15582

MediumPublic PoC

Published: 20 February 2026

Published
20 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
EPSS Score 0.0004 13.3th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15582 is a medium-severity Improper Authorization (CWE-285) vulnerability in Detronetdip E-Commerce. Its CVSS base score is 5.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-285 CWE-639

The control mandates authorization decisions for each access request, reducing the ability to exploit improper authorization weaknesses.

addresses: CWE-285 CWE-639

The control requires checking and applying authorization decisions per policy, preventing improper authorization.

addresses: CWE-285

Documented procedures facilitate correct implementation and ongoing management of authorization decisions.

addresses: CWE-285

Periodic reviews identify and correct flaws in authorization decisions or enforcement.

addresses: CWE-285

The control's documentation requirement reduces improper authorization by ensuring only mission-justified actions bypass authentication.

addresses: CWE-285

Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.

addresses: CWE-285

Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.

addresses: CWE-285

The control explicitly requires authorization of each wireless access type prior to permitting connections.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authorization bypass (IDOR) in public-facing e-commerce web app directly enables remote exploitation of the application by authenticated users.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A security flaw has been discovered in detronetdip E-commerce 1.0.0. The impacted element is the function Delete/Update of the component Product Management Module. Performing a manipulation of the argument ID results in authorization bypass. Remote exploitation of the attack is…

more

possible. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2025-15582 is an authorization bypass vulnerability in detronetdip E-commerce version 1.0.0. The issue affects the Delete/Update functions in the Product Management Module, where manipulation of the ID argument allows unauthorized access. This flaw maps to CWE-285 (Improper Authorization) and CWE-639 (Authorization Bypass Through User-Controlled Key), earning a CVSS v3.1 base score of 5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).

Remote exploitation is possible by low-privileged authenticated users (PR:L) over the network, with low complexity and no user interaction required. Attackers can bypass authorization controls to delete or update products, resulting in low integrity (I:L) and availability (A:L) impacts, but no confidentiality loss.

References indicate the project was informed early via GitHub issue #23 (https://github.com/detronetdip/E-commerce/issues/23) but has not responded, with no patches available. An exploit is publicly released at https://github.com/Nixon-H/Ecommerce-IDOR-Product-Manipulation, and details are documented on VulDB (https://vuldb.com/?ctiid.346486, https://vuldb.com/?id.346486).

The public exploit availability heightens the risk of attacks on affected deployments of detronetdip E-commerce 1.0.0.

Details

CWE(s)

Affected Products

detronetdip
e-commerce
1.0.0

CVEs Like This One

CVE-2026-2165Same product: Detronetdip E-Commerce
CVE-2026-2164Same product: Detronetdip E-Commerce
CVE-2026-5842Shared CWE-285, CWE-639
CVE-2024-50617Shared CWE-285
CVE-2023-53914Shared CWE-639
CVE-2025-10855Shared CWE-639
CVE-2025-0352Shared CWE-639
CVE-2026-3124Shared CWE-639
CVE-2025-10024Shared CWE-639
CVE-2026-40246Shared CWE-285

References