Improper Authentication in Joey-Zhou Xiaozhi ESP32 Server Java
CVE-2025-15135
Key Information:
- Vendor
Joey-zhou
- Vendor
- CVE Published:
- 28 December 2025
Badges
What is CVE-2025-15135?
A vulnerability has been identified in the Joey-Zhou Xiaozhi ESP32 Server Java affecting versions up to 3.0.0. The weakness lies within the 'tryAuthenticateWithCookies' function of the 'AuthenticationInterceptor.java' component, specifically the Cookie Handler. This flaw can enable an attacker to perform unauthorized actions by manipulating authentication processes remotely. As the exploit code has been made publicly available, it poses a significant risk to affected systems. Users are strongly encouraged to update to version 4.0.0 to mitigate the issue.
Affected Version(s)
xiaozhi-esp32-server-java 3.0
xiaozhi-esp32-server-java 4.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
