Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 30 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-345 | |
| CPEs | cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:* |
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pbootcms
Pbootcms pbootcms |
|
| Vendors & Products |
Pbootcms
Pbootcms pbootcms |
Mon, 29 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 28 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in PbootCMS up to 3.2.12. The affected element is the function get_user_ip of the file core/function/handle.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to use of less trusted source. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. | |
| Title | PbootCMS Header handle.php get_user_ip less trusted source | |
| Weaknesses | CWE-348 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T06:08:24.576Z
Reserved: 2025-12-27T16:47:11.822Z
Link: CVE-2025-15154
Updated: 2025-12-29T14:47:57.515Z
Status : Analyzed
Published: 2025-12-28T21:15:54.907
Modified: 2025-12-30T19:02:50.287
Link: CVE-2025-15154
No data.
OpenCVE Enrichment
Updated: 2025-12-29T22:33:19Z