CVE-2025-10106: SQL Injection in yanyutao0402 ChanCMS
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. This affects an unknown part of the file /cms/collect/search. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10106 is a SQL Injection vulnerability identified in the yanyutao0402 ChanCMS content management system, specifically affecting versions 3.3.0 and 3.3.1. The vulnerability resides in the /cms/collect/search endpoint, where the 'keyword' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability of the backend database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt CMS functionality. Although the CVSS score is moderate at 5.3, the exploitability is relatively straightforward due to low attack complexity and no need for user interaction. No official patches or fixes have been published yet, and no known exploits are currently reported in the wild. However, public disclosure of the exploit code increases the risk of opportunistic attacks. The vulnerability's partial impact on confidentiality, integrity, and availability (labeled as low in each) suggests that while the damage may be limited compared to more severe SQL injections, it still poses a significant threat to affected systems, especially those handling sensitive content or user data.
Potential Impact
For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability could lead to unauthorized data access, data tampering, or service disruption. Given that CMS platforms often manage website content, user information, and sometimes transactional data, exploitation could result in data breaches, defacement, or loss of trust from customers and partners. Organizations in sectors such as media, education, government, and SMEs that rely on ChanCMS for web presence are particularly at risk. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, potentially leading to regulatory non-compliance under GDPR if personal data is exposed. Additionally, compromised CMS instances could be leveraged as footholds for further network intrusion or to distribute malware, amplifying the security impact.
Mitigation Recommendations
Organizations should immediately audit their use of ChanCMS to identify if versions 3.3.0 or 3.3.1 are deployed. Until an official patch is released, applying web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'keyword' parameter in the /cms/collect/search endpoint is critical. Input validation and sanitization should be enforced at the application level, employing parameterized queries or prepared statements if source code access is available. Monitoring web server logs for suspicious query patterns and unusual database errors can help detect attempted exploitation. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Organizations should also consider isolating the CMS environment and conducting penetration testing to assess exposure. Finally, maintain readiness to apply vendor patches promptly once available and update incident response plans to address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden
CVE-2025-10106: SQL Injection in yanyutao0402 ChanCMS
Description
A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. This affects an unknown part of the file /cms/collect/search. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10106 is a SQL Injection vulnerability identified in the yanyutao0402 ChanCMS content management system, specifically affecting versions 3.3.0 and 3.3.1. The vulnerability resides in the /cms/collect/search endpoint, where the 'keyword' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability of the backend database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt CMS functionality. Although the CVSS score is moderate at 5.3, the exploitability is relatively straightforward due to low attack complexity and no need for user interaction. No official patches or fixes have been published yet, and no known exploits are currently reported in the wild. However, public disclosure of the exploit code increases the risk of opportunistic attacks. The vulnerability's partial impact on confidentiality, integrity, and availability (labeled as low in each) suggests that while the damage may be limited compared to more severe SQL injections, it still poses a significant threat to affected systems, especially those handling sensitive content or user data.
Potential Impact
For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability could lead to unauthorized data access, data tampering, or service disruption. Given that CMS platforms often manage website content, user information, and sometimes transactional data, exploitation could result in data breaches, defacement, or loss of trust from customers and partners. Organizations in sectors such as media, education, government, and SMEs that rely on ChanCMS for web presence are particularly at risk. The remote and unauthenticated nature of the attack increases the likelihood of exploitation, potentially leading to regulatory non-compliance under GDPR if personal data is exposed. Additionally, compromised CMS instances could be leveraged as footholds for further network intrusion or to distribute malware, amplifying the security impact.
Mitigation Recommendations
Organizations should immediately audit their use of ChanCMS to identify if versions 3.3.0 or 3.3.1 are deployed. Until an official patch is released, applying web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'keyword' parameter in the /cms/collect/search endpoint is critical. Input validation and sanitization should be enforced at the application level, employing parameterized queries or prepared statements if source code access is available. Monitoring web server logs for suspicious query patterns and unusual database errors can help detect attempted exploitation. Restricting database user permissions to the minimum necessary can limit the impact of a successful injection. Organizations should also consider isolating the CMS environment and conducting penetration testing to assess exposure. Finally, maintain readiness to apply vendor patches promptly once available and update incident response plans to address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T14:00:48.804Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf4eb7d5a2966cfc837d8c
Added to database: 9/8/2025, 9:46:31 PM
Last enriched: 9/16/2025, 1:04:53 AM
Last updated: 10/30/2025, 3:40:44 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.