Skip to main content

CVE-2025-10106: SQL Injection in yanyutao0402 ChanCMS

Medium
VulnerabilityCVE-2025-10106cvecve-2025-10106
Published: Mon Sep 08 2025 (09/08/2025, 21:32:05 UTC)
Source: CVE Database V5
Vendor/Project: yanyutao0402
Product: ChanCMS

Description

A vulnerability has been found in yanyutao0402 ChanCMS up to 3.3.1. This affects an unknown part of the file /cms/collect/search. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/08/2025, 22:01:25 UTC

Technical Analysis

CVE-2025-10106 is a SQL Injection vulnerability identified in the ChanCMS content management system, specifically affecting versions up to 3.3.1. The vulnerability resides in the /cms/collect/search endpoint, where the 'keyword' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, making it accessible to unauthenticated attackers over the network. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity. The attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability can lead to unauthorized data access or modification within the CMS database. Although no public exploits are currently known in the wild, the exploit code has been disclosed, increasing the risk of exploitation. The vulnerability does not affect the entire CMS but targets a specific search functionality, which may limit the scope of impact depending on deployment and usage. No official patches or mitigation links have been provided yet, highlighting the need for immediate attention from administrators using affected versions.

Potential Impact

For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized access to sensitive data stored in the CMS database, including potentially user information, content, or configuration details. This could result in data breaches, reputational damage, and compliance violations under regulations such as GDPR. The ability to manipulate database queries remotely without authentication increases the threat level, especially for publicly accessible CMS instances. However, the limited scope of the vulnerability and the medium severity score suggest that while impactful, it is not likely to cause widespread system outages or complete data compromise. Organizations relying heavily on ChanCMS for critical web services or content delivery should prioritize mitigation to prevent potential exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as public exploit disclosure may lead to increased attack attempts.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade ChanCMS to a version beyond 3.3.1 once an official patch is released addressing this vulnerability. 2. Input validation: Until a patch is available, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'keyword' parameter in /cms/collect/search. 3. Restrict access: Limit access to the vulnerable endpoint by IP whitelisting or VPN access where feasible to reduce exposure. 4. Database permissions: Ensure the database user account used by ChanCMS has the minimum necessary privileges to limit potential damage from injection attacks. 5. Monitoring and logging: Enable detailed logging of web requests and database queries to detect anomalous activity indicative of exploitation attempts. 6. Incident response readiness: Prepare to respond to potential breaches by having data backup and recovery plans in place. 7. Security testing: Conduct regular vulnerability scans and penetration tests focusing on injection flaws in the CMS environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T14:00:48.804Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf4eb7d5a2966cfc837d8c

Added to database: 9/8/2025, 9:46:31 PM

Last enriched: 9/8/2025, 10:01:25 PM

Last updated: 9/10/2025, 3:10:20 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats