CVE-2025-15426

7.3 HIGH

📋 TL;DR

This vulnerability in jackying H-ui.admin allows attackers to upload arbitrary files without restrictions via the /lib/webuploader/0.1.5/server/preview.php endpoint. This can lead to remote code execution on affected systems. Organizations using H-ui.admin up to version 3.1 are vulnerable.

💻 Affected Systems

Products:
  • jackying H-ui.admin
Versions: Up to and including 3.1
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the vulnerable preview.php file accessible via web.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Webshell deployment leading to persistent access, data exfiltration, or use as part of a botnet.

🟢

If Mitigated

File upload attempts blocked at WAF or detected by security monitoring before successful exploitation.

🌐 Internet-Facing: HIGH - Attack is remotely exploitable and exploit is publicly available.
🏢 Internal Only: MEDIUM - Internal attackers could exploit, but external threat is higher due to public exploit.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available on GitHub, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider removing or replacing H-ui.admin with alternative software.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Restrict access to the vulnerable preview.php file via web server configuration

# Apache: Add to .htaccess or virtual host config
<Files "preview.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /lib/webuploader/0.1.5/server/preview\.php$ {
    deny all;
    return 403;
}

Remove vulnerable file

linux

Delete the vulnerable preview.php file from the server

rm /path/to/webroot/lib/webuploader/0.1.5/server/preview.php

🧯 If You Can't Patch

  • Implement strict file upload validation and whitelisting for all upload functionality
  • Deploy web application firewall (WAF) with rules to block malicious file upload attempts

🔍 How to Verify

Check if Vulnerable:

Check if file exists: /lib/webuploader/0.1.5/server/preview.php in web directory. Test by attempting to upload a file to this endpoint.

Check Version:

Check H-ui.admin version in admin panel or look for version markers in source files

Verify Fix Applied:

Verify preview.php file is removed or returns 403/404. Test file upload functionality is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /lib/webuploader/0.1.5/server/preview.php
  • File uploads with suspicious extensions (.php, .jsp, .asp)
  • Unusual file creation in web directories

Network Indicators:

  • POST requests to preview.php endpoint with file uploads
  • Traffic patterns matching known exploit payloads

SIEM Query:

source="web_server" AND (url="/lib/webuploader/0.1.5/server/preview.php" OR file_extension IN ("php", "jsp", "asp"))

🔗 References

📤 Share & Export