Skip to main content

CVE-2025-10122: SQL Injection in Maccms10

Medium
VulnerabilityCVE-2025-10122cvecve-2025-10122
Published: Tue Sep 09 2025 (09/09/2025, 02:32:07 UTC)
Source: CVE Database V5
Product: Maccms10

Description

A vulnerability was found in Maccms10 2025.1000.4050. Affected is the function rep of the file application/admin/controller/Database.php. Performing manipulation of the argument where results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/09/2025, 03:01:35 UTC

Technical Analysis

CVE-2025-10122 is a SQL Injection vulnerability identified in the Maccms10 content management system, specifically affecting version 2025.1000.4050. The flaw resides in the 'rep' function within the file application/admin/controller/Database.php. The vulnerability arises due to improper sanitization or validation of the 'where' argument, allowing an attacker to manipulate SQL queries executed by the application. This manipulation can lead to unauthorized access or modification of the database contents. The vulnerability can be exploited remotely without requiring user interaction or authentication, which significantly lowers the barrier for attackers. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that while the attack vector is network-based and requires no user interaction, it does require high privileges (PR:H) to exploit, and the impact on confidentiality, integrity, and availability is limited to low. Although no public exploits have been observed in the wild yet, the exploit code has been made public, increasing the risk of exploitation. The vulnerability's scope is limited to the affected version of Maccms10, a CMS platform often used for media content management. The vulnerability could allow attackers to extract sensitive data, modify database records, or potentially escalate privileges if chained with other vulnerabilities.

Potential Impact

For European organizations using Maccms10 version 2025.1000.4050, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized data disclosure or tampering, impacting data confidentiality and integrity. Given that Maccms10 is used primarily for media content management, organizations relying on it for publishing or streaming services could face service disruptions or reputational damage if attackers manipulate content or gain unauthorized access to backend data. The fact that exploitation requires high privileges somewhat limits the risk to internal threat actors or attackers who have already compromised lower-level accounts. However, if attackers gain such privileges, they could leverage this vulnerability to deepen their access or exfiltrate sensitive information. In the European context, data protection regulations such as GDPR impose strict requirements on data security; a breach resulting from this vulnerability could lead to regulatory penalties and loss of customer trust. Additionally, media and entertainment sectors, which are significant in Europe, could be targeted to disrupt services or steal intellectual property.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Maccms10 to a patched version once available from the vendor. In the absence of an official patch, administrators should implement strict input validation and sanitization on all parameters passed to the 'rep' function, especially the 'where' argument, to prevent injection of malicious SQL code. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this endpoint can provide a temporary protective layer. Restricting database user privileges to the minimum necessary can reduce the impact of a successful injection. Regularly auditing and monitoring database queries and application logs for anomalous activity related to the 'rep' function can help detect exploitation attempts early. Additionally, network segmentation and limiting administrative access to trusted IPs can reduce the attack surface. Organizations should also conduct security awareness training for administrators to recognize and respond to suspicious activities promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T15:16:57.456Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf9505d5a2966cfc85b355

Added to database: 9/9/2025, 2:46:29 AM

Last enriched: 9/9/2025, 3:01:35 AM

Last updated: 9/9/2025, 8:35:36 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats