CVE-2025-15225
Arbitrary File Read via Path Traversal in WMPro Allows Remote Access
Publication date: 2025-12-29
Last updated on: 2025-12-29
Assigner: TWCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sunnet | wmpro | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in WMPro developed by Sunnet is an Arbitrary File Read issue. It allows unauthenticated remote attackers to exploit Relative Path Traversal to read arbitrary system files on the affected system.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to read sensitive system files without authentication. This can lead to exposure of confidential information, potentially compromising system security and privacy.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated remote attackers to read arbitrary system files, compromising confidentiality. This exposure of sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding personal and sensitive information. Organizations using affected WMPro versions should apply patches and adjust configurations to mitigate this risk and maintain compliance. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate steps to mitigate this vulnerability are to contact the vendor to install patches for WMPro versions 5.0 to 5.2 and adjust system configurations accordingly. [1, 2]