A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
History

Wed, 07 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Zspace
Zspace z4pro\+
Zspace z4pro\+ Firmware
CPEs cpe:2.3:h:zspace:z4pro\+:-:*:*:*:*:*:*:*
cpe:2.3:o:zspace:z4pro\+_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zspace
Zspace z4pro\+
Zspace z4pro\+ Firmware

Mon, 29 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 28 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in ZSPACE Z4Pro+ 1.0.0440024. Impacted is the function zfilev2_api_SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
Title ZSPACE Z4Pro+ HTTP POST Request status zfilev2_api_SafeStatus command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-12-28T10:02:06.337Z

Updated: 2025-12-29T18:01:13.797Z

Reserved: 2025-12-27T09:36:42.617Z

Link: CVE-2025-15131

cve-icon Vulnrichment

Updated: 2025-12-29T18:01:10.913Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-28T10:15:41.110

Modified: 2026-01-07T21:39:23.347

Link: CVE-2025-15131

cve-icon Redhat

No data.