CVE-2025-10106: SQL Injection in yanyutao0402 ChanCMS
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. This affects an unknown part of the file /cms/collect/search. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10106 is a SQL Injection vulnerability identified in the ChanCMS content management system, specifically affecting versions up to 3.3.1. The vulnerability resides in the /cms/collect/search endpoint, where the 'keyword' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, making it accessible to unauthenticated attackers over the network. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity. The attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability can lead to unauthorized data access or modification within the CMS database. Although no public exploits are currently known in the wild, the exploit code has been disclosed, increasing the risk of exploitation. The vulnerability does not affect the entire CMS but targets a specific search functionality, which may limit the scope of impact depending on deployment and usage. No official patches or mitigation links have been provided yet, highlighting the need for immediate attention from administrators using affected versions.
Potential Impact
For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized access to sensitive data stored in the CMS database, including potentially user information, content, or configuration details. This could result in data breaches, reputational damage, and compliance violations under regulations such as GDPR. The ability to manipulate database queries remotely without authentication increases the threat level, especially for publicly accessible CMS instances. However, the limited scope of the vulnerability and the medium severity score suggest that while impactful, it is not likely to cause widespread system outages or complete data compromise. Organizations relying heavily on ChanCMS for critical web services or content delivery should prioritize mitigation to prevent potential exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as public exploit disclosure may lead to increased attack attempts.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade ChanCMS to a version beyond 3.3.1 once an official patch is released addressing this vulnerability. 2. Input validation: Until a patch is available, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'keyword' parameter in /cms/collect/search. 3. Restrict access: Limit access to the vulnerable endpoint by IP whitelisting or VPN access where feasible to reduce exposure. 4. Database permissions: Ensure the database user account used by ChanCMS has the minimum necessary privileges to limit potential damage from injection attacks. 5. Monitoring and logging: Enable detailed logging of web requests and database queries to detect anomalous activity indicative of exploitation attempts. 6. Incident response readiness: Prepare to respond to potential breaches by having data backup and recovery plans in place. 7. Security testing: Conduct regular vulnerability scans and penetration tests focusing on injection flaws in the CMS environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10106: SQL Injection in yanyutao0402 ChanCMS
Description
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. This affects an unknown part of the file /cms/collect/search. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10106 is a SQL Injection vulnerability identified in the ChanCMS content management system, specifically affecting versions up to 3.3.1. The vulnerability resides in the /cms/collect/search endpoint, where the 'keyword' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, making it accessible to unauthenticated attackers over the network. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity. The attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability can lead to unauthorized data access or modification within the CMS database. Although no public exploits are currently known in the wild, the exploit code has been disclosed, increasing the risk of exploitation. The vulnerability does not affect the entire CMS but targets a specific search functionality, which may limit the scope of impact depending on deployment and usage. No official patches or mitigation links have been provided yet, highlighting the need for immediate attention from administrators using affected versions.
Potential Impact
For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized access to sensitive data stored in the CMS database, including potentially user information, content, or configuration details. This could result in data breaches, reputational damage, and compliance violations under regulations such as GDPR. The ability to manipulate database queries remotely without authentication increases the threat level, especially for publicly accessible CMS instances. However, the limited scope of the vulnerability and the medium severity score suggest that while impactful, it is not likely to cause widespread system outages or complete data compromise. Organizations relying heavily on ChanCMS for critical web services or content delivery should prioritize mitigation to prevent potential exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as public exploit disclosure may lead to increased attack attempts.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade ChanCMS to a version beyond 3.3.1 once an official patch is released addressing this vulnerability. 2. Input validation: Until a patch is available, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'keyword' parameter in /cms/collect/search. 3. Restrict access: Limit access to the vulnerable endpoint by IP whitelisting or VPN access where feasible to reduce exposure. 4. Database permissions: Ensure the database user account used by ChanCMS has the minimum necessary privileges to limit potential damage from injection attacks. 5. Monitoring and logging: Enable detailed logging of web requests and database queries to detect anomalous activity indicative of exploitation attempts. 6. Incident response readiness: Prepare to respond to potential breaches by having data backup and recovery plans in place. 7. Security testing: Conduct regular vulnerability scans and penetration tests focusing on injection flaws in the CMS environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T14:00:48.804Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf4eb7d5a2966cfc837d8c
Added to database: 9/8/2025, 9:46:31 PM
Last enriched: 9/8/2025, 10:01:25 PM
Last updated: 9/10/2025, 3:10:20 AM
Views: 8
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.