Command Injection Vulnerability in Ilevia EVE X1 Server by Ilevia
CVE-2025-14276

6.3MEDIUM

Key Information:

Vendor

Ilevia

Vendor
CVE Published:
8 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-14276?

A command injection vulnerability exists in the Ilevia EVE X1 Server affecting version 4.6.5.0.eden. This issue is found in the /ajax/php/leaf_search.php file, where inadequate input validation allows an attacker to manipulate arguments, leading to potential command execution on the server. Although the vulnerability can be exploited remotely, the complexity of execution is considered high, requiring significant expertise. It is crucial for users to upgrade the affected server to mitigate risks, as Ilevia has acknowledged the vulnerability and recommends closing external ports to enhance security.

Affected Version(s)

EVE X1 Server 4.6.5.0.eden

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

niix330 (VulDB User)
.