A vulnerability was identified in ZSPACE Z4Pro+ 1.0.0440024. The impacted element is the function zfilev2_api_CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
PUBLISHED5.2CWE-77CWE-74
ZSPACE Z4Pro+ HTTP POST Request close zfilev2_api_CloseSafe command injection
Problem type
Affected products
ZSPACE
Z4Pro+
1.0.0440024 - AFFECTED
References
VDB-338511 | ZSPACE Z4Pro+ HTTP POST Request close zfilev2_api_CloseSafe command injection
https://vuldb.com/?id.338511
VDB-338511 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/?ctiid.338511
Submit #713887 | ZSPACE Z4Pro+ v1.0.0440024 Command Injection
https://vuldb.com/?submit.713887
github.com
https://github.com/LX-66-LX/cve/issues/3
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-15133Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-15133",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2025-12-28T11:02:10.256Z",
"dateReserved": "2025-12-27T09:36:50.303Z",
"datePublished": "2025-12-28T11:02:10.256Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-12-28T11:02:10.256Z"
},
"title": "ZSPACE Z4Pro+ HTTP POST Request close zfilev2_api_CloseSafe command injection",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in ZSPACE Z4Pro+ 1.0.0440024. The impacted element is the function zfilev2_api_CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure."
}
],
"affected": [
{
"vendor": "ZSPACE",
"product": "Z4Pro+",
"modules": [
"HTTP POST Request Handler"
],
"versions": [
{
"version": "1.0.0440024",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Command Injection",
"cweId": "CWE-77",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.338511",
"name": "VDB-338511 | ZSPACE Z4Pro+ HTTP POST Request close zfilev2_api_CloseSafe command injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.338511",
"name": "VDB-338511 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.713887",
"name": "Submit #713887 | ZSPACE Z4Pro+ v1.0.0440024 Command Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/LX-66-LX/cve/issues/3",
"tags": [
"exploit",
"issue-tracking"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2025-12-27T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-12-27T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-12-27T10:41:58.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "LX-66-LX (VulDB User)",
"type": "reporter"
}
]
}
}
}