Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10106: SQL Injection in yanyutao0402 ChanCMS

0
Medium
VulnerabilityCVE-2025-10106cvecve-2025-10106
Published: Mon Sep 08 2025 (09/08/2025, 21:32:05 UTC)
Source: CVE Database V5
Vendor/Project: yanyutao0402
Product: ChanCMS

Description

A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. This affects an unknown part of the file /cms/collect/search. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/16/2025, 01:04:53 UTC

Technical Analysis

CVE-2025-10106 is a SQL Injection vulnerability identified in the yanyutao0402 ChanCMS content management system, specifically affecting versions 3.3.0 and 3.3.1. The vulnerability resides in the /cms/collect/search endpoint, where the 'keyword' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability of the backend database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt CMS functionality. Although the CVSS score is moderate at 5.3, the exploitability is relatively straightforward due to low attack complexity and no need for user interaction. No official patches or fixes have been published yet, and no known exploits are currently reported in the wild. However, public disclosure of the exploit code increases the risk of opportunistic attacks. The vulnerability's partial impact on confidentiality, integrity, and availability (labeled as low in each) suggests that while the damage may be limited compared to more severe SQL injections, it still poses a significant threat to affected systems, especially those handling sensitive content or user data.

Potential Impact

For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability could lead to unauthorized data access, data tampering, or service disruption. Given that CMS platforms often manage website content, user information, and sometimes transactional data, exploitation could result in data breaches, defacement, or loss of trust from customers and partners. Organizations in sectors such as media, education, government, and SMEs that rely on ChanCMS for web presence are particularly at risk. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, potentially leading to regulatory non-compliance under GDPR if personal data is exposed. Additionally, compromised CMS instances could be leveraged as footholds for further network intrusion or to distribute malware, amplifying the security impact.

Mitigation Recommendations

Organizations should immediately audit their use of ChanCMS to identify if versions 3.3.0 or 3.3.1 are deployed. Until an official patch is released, applying web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'keyword' parameter in the /cms/collect/search endpoint is critical. Input validation and sanitization should be enforced at the application level, employing parameterized queries or prepared statements if source code access is available. Monitoring web server logs for suspicious query patterns and unusual database errors can help detect attempted exploitation. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Organizations should also consider isolating the CMS environment and conducting penetration testing to assess exposure. Finally, maintain readiness to apply vendor patches promptly once available and update incident response plans to address potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T14:00:48.804Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf4eb7d5a2966cfc837d8c

Added to database: 9/8/2025, 9:46:31 PM

Last enriched: 9/16/2025, 1:04:53 AM

Last updated: 10/30/2025, 3:40:44 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats