Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10110: SQL Injection in ChanCMS

0
Medium
VulnerabilityCVE-2025-10110cvecve-2025-10110
Published: Mon Sep 08 2025 (09/08/2025, 22:32:09 UTC)
Source: CVE Database V5
Product: ChanCMS

Description

A vulnerability was identified in ChanCMS up to 3.3.1. Impacted is an unknown function of the file /search/. The manipulation with the input '%20or%201=1%20%23/words.html leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/16/2025, 01:05:25 UTC

Technical Analysis

CVE-2025-10110 is a medium-severity SQL Injection vulnerability affecting ChanCMS versions up to 3.3.1, specifically in an unknown function within the /search/ endpoint. The vulnerability arises from improper sanitization of user input, allowing an attacker to inject SQL code via crafted input such as '%20or%201=1%20%23/words.html'. This input manipulates the underlying SQL query logic, potentially bypassing intended query constraints. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the impact on data confidentiality, integrity, and availability is rated low, the ability to execute arbitrary SQL queries can lead to unauthorized data access, data modification, or denial of service depending on the database and application context. No official patches have been linked yet, and while no known exploits are currently in the wild, a public exploit is available, increasing the likelihood of exploitation. The vulnerability's presence in a CMS platform means that websites using ChanCMS for content management are at risk, potentially exposing sensitive data or allowing attackers to manipulate site content or user data.

Potential Impact

For European organizations using ChanCMS versions 3.3.0 or 3.3.1, this vulnerability poses a significant risk to the confidentiality and integrity of their web applications and stored data. Exploitation could lead to unauthorized data disclosure, data tampering, or disruption of service, which could affect customer trust, regulatory compliance (e.g., GDPR), and operational continuity. Given that ChanCMS is a content management system, compromised sites could also be used to distribute malware or conduct phishing campaigns, amplifying the threat. The medium CVSS score reflects moderate risk, but the availability of a public exploit and the lack of required authentication increase the urgency for mitigation. Organizations in sectors with high data sensitivity, such as finance, healthcare, and government, are particularly vulnerable to reputational and legal consequences if exploited.

Mitigation Recommendations

1. Immediate mitigation should include upgrading ChanCMS to a version beyond 3.3.1 once an official patch is released. Until then, organizations should implement strict input validation and sanitization on the /search/ endpoint to block malicious SQL payloads. 2. Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns, especially targeting the /search/ path. 3. Conduct thorough code reviews and penetration testing focused on SQL injection vectors in ChanCMS deployments. 4. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. 5. Monitor web server and database logs for suspicious query patterns indicative of SQL injection attempts. 6. Consider temporary disabling or restricting access to the vulnerable /search/ functionality if feasible. 7. Educate development and security teams about this vulnerability and ensure rapid response capabilities for any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T14:15:33.950Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf5ce1d5a2966cfc83ddb8

Added to database: 9/8/2025, 10:46:57 PM

Last enriched: 9/16/2025, 1:05:25 AM

Last updated: 10/30/2025, 2:10:03 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats