CVE-2025-2855
Published: 27 March 2025
Summary
CVE-2025-2855 is a medium-severity Improper Input Validation (CWE-20) vulnerability in Eladmin Eladmin. Its CVSS base score is 4.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of the 'servers' argument to prevent deserialization of untrusted data as per CWE-20 and CWE-502.
Mandates timely identification, reporting, and correction of the deserialization flaw in the checkFile function of /api/deploy/upload.
Enforces least privilege to limit high-privilege (PR:H) access to the vulnerable endpoint, reducing the attack surface.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The deserialization of untrusted data vulnerability in the /api/deploy/upload endpoint allows remote exploitation of the web application, mapping to T1190 Exploit Public-Facing Application (even with PR:H requirement for reaching the vulnerable function).
NVD Description
A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is the function checkFile of the file /api/deploy/upload. The manipulation of the argument servers leads to deserialization. The attack may…
more
be launched remotely.
Deeper analysisAI
CVE-2025-2855 is a problematic vulnerability in elunez eladmin versions up to 2.7. It affects the checkFile function within the /api/deploy/upload file, where manipulation of the "servers" argument triggers deserialization of untrusted data. Classified under CWE-20 (Improper Input Validation) and CWE-502 (Deserialization of Untrusted Data), the issue carries a CVSS v3.1 base score of 4.7 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-03-27.
The vulnerability enables remote exploitation by an attacker with high privileges (PR:H). With low attack complexity and no user interaction required, a successful exploit can result in low-level impacts on confidentiality, integrity, and availability within the unchanged scope.
Advisories provide further details via the GitHub issue at https://github.com/elunez/eladmin/issues/873 and VulDB references at https://vuldb.com/?ctiid.301502, https://vuldb.com/?id.301502, and https://vuldb.com/?submit.522504, which may include mitigation guidance or patches.
Details
- CWE(s)