Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25320: n/a

0
Critical
VulnerabilityCVE-2024-25320cvecve-2024-25320
Published: Fri Feb 16 2024 (02/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Tongda OA v2017 and up to v11.9 was discovered to contain a SQL injection vulnerability via the $AFF_ID parameter at /affair/delete.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:42:19 UTC

Technical Analysis

CVE-2024-25320 is a critical SQL injection vulnerability identified in Tongda OA, a widely used office automation software, affecting versions from 2017 through v11.9. The vulnerability resides in the $AFF_ID parameter of the /affair/delete.php script, which fails to properly sanitize user-supplied input before incorporating it into SQL queries. This flaw allows remote attackers to inject malicious SQL code without any authentication or user interaction, enabling them to manipulate the backend database directly. The CVSS 3.1 base score of 9.8 reflects the vulnerability's high exploitability (network vector, low attack complexity) and severe impact on confidentiality, integrity, and availability. Potential attacker actions include unauthorized data disclosure, data modification or deletion, and disruption of application functionality. Although no known public exploits have been reported to date, the vulnerability's characteristics make it a prime target for attackers seeking to compromise enterprise data or disrupt operations. Tongda OA is predominantly used in China and some Asian markets, often in government and corporate environments, increasing the strategic importance of this vulnerability. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations to prevent exploitation.

Potential Impact

The impact of CVE-2024-25320 is severe for organizations using Tongda OA, as successful exploitation can lead to complete compromise of the underlying database. Attackers can exfiltrate sensitive information, alter or delete critical data, and potentially escalate their access within the network. This can result in data breaches, operational disruption, loss of intellectual property, and reputational damage. Given the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, increasing the likelihood of exploitation. Organizations in sectors relying on Tongda OA for document management and workflow automation, such as government agencies, educational institutions, and enterprises in China and neighboring countries, face heightened risk. The absence of known exploits currently provides a small window for remediation, but the critical severity score indicates that exploitation attempts are likely imminent.

Mitigation Recommendations

Until official patches are released, organizations should implement the following mitigations: 1) Deploy web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the $AFF_ID parameter and /affair/delete.php endpoint. 2) Apply strict input validation and sanitization on all user-supplied parameters, especially $AFF_ID, to reject or neutralize malicious input. 3) Restrict access to the /affair/delete.php script by IP whitelisting or network segmentation to limit exposure. 4) Monitor database logs and application logs for unusual queries or error messages indicative of injection attempts. 5) Conduct thorough security assessments and penetration testing focused on SQL injection vectors within Tongda OA deployments. 6) Prepare for rapid deployment of official patches once available and maintain an incident response plan for potential exploitation. 7) Educate administrators and users about the risks and signs of SQL injection attacks to enhance detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d65b7ef31ef0b571c99

Added to database: 2/25/2026, 9:45:09 PM

Last enriched: 2/28/2026, 9:42:19 AM

Last updated: 4/12/2026, 5:07:39 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses