CVE-2025-4428
HIGH KEVIvanti EPMM Authentication Bypass for Expression Language Remote Code Execution
Title source: metasploitDescription
Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.
Exploits (4)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/IvantiEPMM-CVE-2025-4428-RCE.py
vulncheck_xdb
SCANNER
remote
https://github.com/watchtowrlabs/watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428
metasploit
WORKING POC
EXCELLENT
by CERT-EU, Sonny Macdonald, Piotr Bazydlo, remmons-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/ivanti_epmm_rce_cve_2025_4427_4428.rb
Scores
CVSS v3
7.2
EPSS
0.2040
EPSS Percentile
95.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2025-05-19
VulnCheck KEV
2025-05-13
ENISA EUVD
EUVD-2025-14387
CWE
CWE-94
Status
published
Products (2)
ivanti/endpoint_manager_mobile
12.5.0.0
ivanti/endpoint_manager_mobile
< 11.12.0.5
Published
May 13, 2025
KEV Added
May 19, 2025
Tracked Since
Feb 18, 2026