CVE-2024-0483: CWE-89 SQL Injection in Taokeyun
A vulnerability classified as critical was found in Taokeyun up to 1.0.5. This vulnerability affects the function index of the file application/index/controller/app/Task.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250588.
AI Analysis
Technical Summary
CVE-2024-0483 is a SQL Injection vulnerability identified in Taokeyun versions 1.0.0 through 1.0.5. The vulnerability resides in the 'index' function of the file application/index/controller/app/Task.php, specifically in the handling of the HTTP POST parameter 'cid'. An attacker can manipulate this parameter to inject malicious SQL code, which the application then executes on the backend database. This flaw allows remote attackers to exploit the vulnerability without requiring user interaction, although some level of privileges (PR:L) is needed, indicating that the attacker must have limited privileges on the system to initiate the attack. The vulnerability has a CVSS 3.1 base score of 6.3, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The vulnerability could lead to unauthorized disclosure of data, modification of data, or disruption of service. While no public exploits are currently known in the wild, the vulnerability details have been disclosed, increasing the risk of exploitation. No official patches have been linked yet, so mitigation may require workarounds or vendor updates once available.
Potential Impact
For European organizations using Taokeyun versions up to 1.0.5, this vulnerability poses a significant risk. SQL Injection can lead to unauthorized access to sensitive data, including personal data protected under GDPR, potentially resulting in data breaches and regulatory penalties. Integrity of data can be compromised, affecting business operations and trustworthiness of information systems. Availability impacts could disrupt services, leading to operational downtime. Given that the attack can be performed remotely and without user interaction, attackers can exploit this vulnerability at scale. European organizations in sectors such as e-commerce, logistics, or any industry relying on Taokeyun for task or workflow management are at risk. The need for some privilege level to exploit may limit exposure but does not eliminate risk, especially if internal threat actors or compromised accounts exist.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the vulnerable 'index' function or the affected endpoint via network controls such as firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'cid' parameter. 2. Conduct thorough input validation and sanitization on the 'cid' parameter, employing parameterized queries or prepared statements to prevent SQL injection. 3. Monitor logs for unusual database queries or failed injection attempts to detect potential exploitation attempts early. 4. Limit privileges of accounts that can access the vulnerable functionality to the minimum necessary to reduce the impact of exploitation. 5. Engage with the Taokeyun vendor or community to obtain patches or updates as soon as they are released and prioritize their deployment. 6. Perform a security audit of all input handling in the application to identify and remediate similar injection flaws. 7. Educate developers and administrators on secure coding practices and the risks of SQL injection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden
CVE-2024-0483: CWE-89 SQL Injection in Taokeyun
Description
A vulnerability classified as critical was found in Taokeyun up to 1.0.5. This vulnerability affects the function index of the file application/index/controller/app/Task.php of the component HTTP POST Request Handler. The manipulation of the argument cid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250588.
AI-Powered Analysis
Technical Analysis
CVE-2024-0483 is a SQL Injection vulnerability identified in Taokeyun versions 1.0.0 through 1.0.5. The vulnerability resides in the 'index' function of the file application/index/controller/app/Task.php, specifically in the handling of the HTTP POST parameter 'cid'. An attacker can manipulate this parameter to inject malicious SQL code, which the application then executes on the backend database. This flaw allows remote attackers to exploit the vulnerability without requiring user interaction, although some level of privileges (PR:L) is needed, indicating that the attacker must have limited privileges on the system to initiate the attack. The vulnerability has a CVSS 3.1 base score of 6.3, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). The vulnerability could lead to unauthorized disclosure of data, modification of data, or disruption of service. While no public exploits are currently known in the wild, the vulnerability details have been disclosed, increasing the risk of exploitation. No official patches have been linked yet, so mitigation may require workarounds or vendor updates once available.
Potential Impact
For European organizations using Taokeyun versions up to 1.0.5, this vulnerability poses a significant risk. SQL Injection can lead to unauthorized access to sensitive data, including personal data protected under GDPR, potentially resulting in data breaches and regulatory penalties. Integrity of data can be compromised, affecting business operations and trustworthiness of information systems. Availability impacts could disrupt services, leading to operational downtime. Given that the attack can be performed remotely and without user interaction, attackers can exploit this vulnerability at scale. European organizations in sectors such as e-commerce, logistics, or any industry relying on Taokeyun for task or workflow management are at risk. The need for some privilege level to exploit may limit exposure but does not eliminate risk, especially if internal threat actors or compromised accounts exist.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the vulnerable 'index' function or the affected endpoint via network controls such as firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the 'cid' parameter. 2. Conduct thorough input validation and sanitization on the 'cid' parameter, employing parameterized queries or prepared statements to prevent SQL injection. 3. Monitor logs for unusual database queries or failed injection attempts to detect potential exploitation attempts early. 4. Limit privileges of accounts that can access the vulnerable functionality to the minimum necessary to reduce the impact of exploitation. 5. Engage with the Taokeyun vendor or community to obtain patches or updates as soon as they are released and prioritize their deployment. 6. Perform a security audit of all input handling in the application to identify and remediate similar injection flaws. 7. Educate developers and administrators on secure coding practices and the risks of SQL injection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-12T11:10:56.857Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f034b182aa0cae27e6697
Added to database: 6/3/2025, 2:14:35 PM
Last enriched: 7/4/2025, 2:57:11 PM
Last updated: 7/29/2025, 6:25:12 PM
Views: 9
Related Threats
CVE-2025-49898: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Xolluteon Dropshix
MediumCVE-2025-55207: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in withastro astro
MediumCVE-2025-49897: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gopiplus Vertical scroll slideshow gallery v2
HighCVE-2025-49432: CWE-862 Missing Authorization in FWDesign Ultimate Video Player
MediumCVE-2025-55203: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in makeplane plane
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.