CVE-2024-0480: CWE-89 SQL Injection in Taokeyun
A vulnerability was found in Taokeyun up to 1.0.5. It has been declared as critical. Affected by this vulnerability is the function index of the file application/index/controller/m/Drs.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250585 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0480 is a critical SQL injection vulnerability identified in Taokeyun, an application with versions up to 1.0.5 affected. The vulnerability resides in the HTTP POST request handler within the index function of the file application/index/controller/m/Drs.php. Specifically, the 'cid' parameter is vulnerable due to insufficient input validation and sanitization, allowing an attacker to inject arbitrary SQL commands. This flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, increasing the attack surface. The vulnerability can lead to unauthorized access to sensitive information, data tampering, or denial of service by corrupting or deleting database records. The CVSS 3.1 base score of 7.3 reflects its high severity, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits have been observed in the wild yet, the public disclosure of the vulnerability and its details increases the risk of exploitation. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts. Organizations using Taokeyun should audit their deployments, restrict access to vulnerable endpoints, and monitor for suspicious database activity. This vulnerability is categorized under CWE-89, a common and dangerous injection flaw that remains a frequent cause of data breaches.
Potential Impact
For European organizations, exploitation of CVE-2024-0480 could result in significant data breaches, including leakage of confidential customer or business data, undermining privacy and compliance with regulations such as GDPR. Integrity of data could be compromised, leading to unauthorized modifications that affect business operations or financial records. Availability impacts could arise if attackers execute destructive SQL commands, causing service outages or data loss. Organizations in sectors handling sensitive information—such as finance, healthcare, and government—face heightened risks. The remote, unauthenticated nature of the vulnerability means attackers can exploit it from anywhere, increasing the threat landscape. Additionally, the public disclosure raises the likelihood of automated scanning and exploitation attempts targeting European networks. Failure to address this vulnerability promptly could lead to reputational damage, regulatory penalties, and operational disruptions.
Mitigation Recommendations
European organizations should immediately identify all Taokeyun instances running versions 1.0.0 through 1.0.5 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict input validation and sanitization on the 'cid' parameter at the application or web server level to block malicious payloads. Employ Web Application Firewalls (WAFs) configured with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint. Restrict network access to the affected application components by limiting exposure to trusted IP addresses and enforcing strong network segmentation. Conduct thorough logging and monitoring of database queries and application logs to detect anomalous activities indicative of exploitation attempts. Perform regular security assessments and penetration testing focusing on injection flaws. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. Finally, prepare an incident response plan to quickly contain and remediate any exploitation events.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-0480: CWE-89 SQL Injection in Taokeyun
Description
A vulnerability was found in Taokeyun up to 1.0.5. It has been declared as critical. Affected by this vulnerability is the function index of the file application/index/controller/m/Drs.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250585 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0480 is a critical SQL injection vulnerability identified in Taokeyun, an application with versions up to 1.0.5 affected. The vulnerability resides in the HTTP POST request handler within the index function of the file application/index/controller/m/Drs.php. Specifically, the 'cid' parameter is vulnerable due to insufficient input validation and sanitization, allowing an attacker to inject arbitrary SQL commands. This flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, increasing the attack surface. The vulnerability can lead to unauthorized access to sensitive information, data tampering, or denial of service by corrupting or deleting database records. The CVSS 3.1 base score of 7.3 reflects its high severity, with attack vector being network-based, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits have been observed in the wild yet, the public disclosure of the vulnerability and its details increases the risk of exploitation. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts. Organizations using Taokeyun should audit their deployments, restrict access to vulnerable endpoints, and monitor for suspicious database activity. This vulnerability is categorized under CWE-89, a common and dangerous injection flaw that remains a frequent cause of data breaches.
Potential Impact
For European organizations, exploitation of CVE-2024-0480 could result in significant data breaches, including leakage of confidential customer or business data, undermining privacy and compliance with regulations such as GDPR. Integrity of data could be compromised, leading to unauthorized modifications that affect business operations or financial records. Availability impacts could arise if attackers execute destructive SQL commands, causing service outages or data loss. Organizations in sectors handling sensitive information—such as finance, healthcare, and government—face heightened risks. The remote, unauthenticated nature of the vulnerability means attackers can exploit it from anywhere, increasing the threat landscape. Additionally, the public disclosure raises the likelihood of automated scanning and exploitation attempts targeting European networks. Failure to address this vulnerability promptly could lead to reputational damage, regulatory penalties, and operational disruptions.
Mitigation Recommendations
European organizations should immediately identify all Taokeyun instances running versions 1.0.0 through 1.0.5 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict input validation and sanitization on the 'cid' parameter at the application or web server level to block malicious payloads. Employ Web Application Firewalls (WAFs) configured with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint. Restrict network access to the affected application components by limiting exposure to trusted IP addresses and enforcing strong network segmentation. Conduct thorough logging and monitoring of database queries and application logs to detect anomalous activities indicative of exploitation attempts. Perform regular security assessments and penetration testing focusing on injection flaws. Educate development teams on secure coding practices to prevent similar vulnerabilities in future releases. Finally, prepare an incident response plan to quickly contain and remediate any exploitation events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T11:10:45.308Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e6693
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 11/4/2025, 7:33:29 PM
Last updated: 12/4/2025, 1:53:03 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14005: Cross Site Scripting in dayrui XunRuiCMS
MediumCVE-2025-14004: Server-Side Request Forgery in dayrui XunRuiCMS
MediumCVE-2025-11222: na in LINE Corporation Central Dogma
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.