CVE-2025-4428

HIGH KEV

Ivanti EPMM Authentication Bypass for Expression Language Remote Code Execution

Title source: metasploit

Description

Remote Code Execution in API component in Ivanti Endpoint Manager Mobile 12.5.0.0 and prior on unspecified platforms allows authenticated attackers to execute arbitrary code via crafted API requests.

Exploits (4)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/IvantiEPMM-CVE-2025-4428-RCE.py
nomisec WORKING POC 4 stars
by xie-22 · remote
https://github.com/xie-22/CVE-2025-4428
vulncheck_xdb SCANNER
remote
https://github.com/watchtowrlabs/watchTowr-vs-Ivanti-EPMM-CVE-2025-4427-CVE-2025-4428
metasploit WORKING POC EXCELLENT
by CERT-EU, Sonny Macdonald, Piotr Bazydlo, remmons-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/ivanti_epmm_rce_cve_2025_4427_4428.rb

Scores

CVSS v3 7.2
EPSS 0.2040
EPSS Percentile 95.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2025-05-19
VulnCheck KEV 2025-05-13
ENISA EUVD EUVD-2025-14387
CWE
CWE-94
Status published
Products (2)
ivanti/endpoint_manager_mobile 12.5.0.0
ivanti/endpoint_manager_mobile < 11.12.0.5
Published May 13, 2025
KEV Added May 19, 2025
Tracked Since Feb 18, 2026