CVE-2023-6276: CWE-89 SQL Injection in Tongda OA 2017
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2023-6276 is a critical SQL Injection vulnerability identified in Tongda OA 2017 versions up to 11.9, specifically affecting the file general/wiki/cp/ct/delete.php. The vulnerability arises from improper sanitization of the PROJ_ID_STR parameter, which can be manipulated by an attacker to inject malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring user interaction, but does require some level of privileges (PR:L) as indicated by the CVSS vector. Exploitation could lead to unauthorized data disclosure, modification, or deletion, impacting confidentiality, integrity, and availability of the system. Although no known exploits are currently reported in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The issue is resolved by upgrading to Tongda OA 2017 version 11.10 or later. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Tongda OA 2017, this vulnerability poses a significant risk to sensitive business data managed within the OA platform. Successful exploitation could lead to data breaches involving confidential project information, unauthorized data manipulation, or service disruption. Given that Tongda OA is an office automation system commonly used for internal collaboration and document management, compromise could facilitate lateral movement within corporate networks, potentially exposing other critical systems. The medium severity rating suggests moderate impact, but the critical nature of SQL injection vulnerabilities and the public disclosure increase urgency. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. Additionally, the remote attack vector means attackers can exploit the vulnerability without physical access, increasing the threat surface.
Mitigation Recommendations
European organizations should prioritize upgrading Tongda OA 2017 installations to version 11.10 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict input validation and sanitization on the PROJ_ID_STR parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Employing database activity monitoring can help detect anomalous queries indicative of exploitation attempts. Restricting database user privileges associated with the OA application to the minimum necessary can limit the impact of a successful injection. Network segmentation should isolate the OA system from sensitive backend systems to reduce lateral movement risk. Regularly auditing and monitoring logs for unusual access patterns or errors related to the affected endpoint (general/wiki/cp/ct/delete.php) is recommended. Finally, organizations should ensure timely application of security patches and maintain an incident response plan tailored to web application attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-6276: CWE-89 SQL Injection in Tongda OA 2017
Description
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-6276 is a critical SQL Injection vulnerability identified in Tongda OA 2017 versions up to 11.9, specifically affecting the file general/wiki/cp/ct/delete.php. The vulnerability arises from improper sanitization of the PROJ_ID_STR parameter, which can be manipulated by an attacker to inject malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring user interaction, but does require some level of privileges (PR:L) as indicated by the CVSS vector. Exploitation could lead to unauthorized data disclosure, modification, or deletion, impacting confidentiality, integrity, and availability of the system. Although no known exploits are currently reported in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The issue is resolved by upgrading to Tongda OA 2017 version 11.10 or later. The CVSS v3.1 base score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Tongda OA 2017, this vulnerability poses a significant risk to sensitive business data managed within the OA platform. Successful exploitation could lead to data breaches involving confidential project information, unauthorized data manipulation, or service disruption. Given that Tongda OA is an office automation system commonly used for internal collaboration and document management, compromise could facilitate lateral movement within corporate networks, potentially exposing other critical systems. The medium severity rating suggests moderate impact, but the critical nature of SQL injection vulnerabilities and the public disclosure increase urgency. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face heightened compliance risks and potential legal consequences if exploited. Additionally, the remote attack vector means attackers can exploit the vulnerability without physical access, increasing the threat surface.
Mitigation Recommendations
European organizations should prioritize upgrading Tongda OA 2017 installations to version 11.10 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict input validation and sanitization on the PROJ_ID_STR parameter at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads. Employing database activity monitoring can help detect anomalous queries indicative of exploitation attempts. Restricting database user privileges associated with the OA application to the minimum necessary can limit the impact of a successful injection. Network segmentation should isolate the OA system from sensitive backend systems to reduce lateral movement risk. Regularly auditing and monitoring logs for unusual access patterns or errors related to the affected endpoint (general/wiki/cp/ct/delete.php) is recommended. Finally, organizations should ensure timely application of security patches and maintain an incident response plan tailored to web application attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-11-24T07:43:51.114Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034a182aa0cae27e6630
Added to database: 6/3/2025, 2:14:34 PM
Last enriched: 7/4/2025, 4:25:25 PM
Last updated: 12/3/2025, 5:46:20 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13495: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpmanageninja FluentCart A New Era of eCommerce – Faster, Lighter, and Simpler
MediumCVE-2025-12585: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in mxchat MxChat – AI Chatbot for WordPress
MediumCVE-2025-10304: CWE-862 Missing Authorization in everestthemes Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin
MediumCVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.