CVE-2025-10122: SQL Injection in Maccms10
A vulnerability was found in Maccms10 2025.1000.4050. Affected is the function rep of the file application/admin/controller/Database.php. Performing manipulation of the argument where results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10122 is a SQL Injection vulnerability identified in the Maccms10 content management system, specifically affecting version 2025.1000.4050. The flaw resides in the 'rep' function within the file application/admin/controller/Database.php. The vulnerability arises due to improper sanitization or validation of the 'where' argument, allowing an attacker to manipulate SQL queries executed by the application. This manipulation can lead to unauthorized access or modification of the database contents. The vulnerability can be exploited remotely without requiring user interaction or authentication, which significantly lowers the barrier for attackers. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that while the attack vector is network-based and requires no user interaction, it does require high privileges (PR:H) to exploit, and the impact on confidentiality, integrity, and availability is limited to low. Although no public exploits have been observed in the wild yet, the exploit code has been made public, increasing the risk of exploitation. The vulnerability's scope is limited to the affected version of Maccms10, a CMS platform often used for media content management. The vulnerability could allow attackers to extract sensitive data, modify database records, or potentially escalate privileges if chained with other vulnerabilities.
Potential Impact
For European organizations using Maccms10 version 2025.1000.4050, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized data disclosure or tampering, impacting data confidentiality and integrity. Given that Maccms10 is used primarily for media content management, organizations relying on it for publishing or streaming services could face service disruptions or reputational damage if attackers manipulate content or gain unauthorized access to backend data. The fact that exploitation requires high privileges somewhat limits the risk to internal threat actors or attackers who have already compromised lower-level accounts. However, if attackers gain such privileges, they could leverage this vulnerability to deepen their access or exfiltrate sensitive information. In the European context, data protection regulations such as GDPR impose strict requirements on data security; a breach resulting from this vulnerability could lead to regulatory penalties and loss of customer trust. Additionally, media and entertainment sectors, which are significant in Europe, could be targeted to disrupt services or steal intellectual property.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Maccms10 to a patched version once available from the vendor. In the absence of an official patch, administrators should implement strict input validation and sanitization on all parameters passed to the 'rep' function, especially the 'where' argument, to prevent injection of malicious SQL code. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this endpoint can provide a temporary protective layer. Restricting database user privileges to the minimum necessary can reduce the impact of a successful injection. Regularly auditing and monitoring database queries and application logs for anomalous activity related to the 'rep' function can help detect exploitation attempts early. Additionally, network segmentation and limiting administrative access to trusted IPs can reduce the attack surface. Organizations should also conduct security awareness training for administrators to recognize and respond to suspicious activities promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10122: SQL Injection in Maccms10
Description
A vulnerability was found in Maccms10 2025.1000.4050. Affected is the function rep of the file application/admin/controller/Database.php. Performing manipulation of the argument where results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10122 is a SQL Injection vulnerability identified in the Maccms10 content management system, specifically affecting version 2025.1000.4050. The flaw resides in the 'rep' function within the file application/admin/controller/Database.php. The vulnerability arises due to improper sanitization or validation of the 'where' argument, allowing an attacker to manipulate SQL queries executed by the application. This manipulation can lead to unauthorized access or modification of the database contents. The vulnerability can be exploited remotely without requiring user interaction or authentication, which significantly lowers the barrier for attackers. The CVSS 4.0 base score is 5.1 (medium severity), reflecting that while the attack vector is network-based and requires no user interaction, it does require high privileges (PR:H) to exploit, and the impact on confidentiality, integrity, and availability is limited to low. Although no public exploits have been observed in the wild yet, the exploit code has been made public, increasing the risk of exploitation. The vulnerability's scope is limited to the affected version of Maccms10, a CMS platform often used for media content management. The vulnerability could allow attackers to extract sensitive data, modify database records, or potentially escalate privileges if chained with other vulnerabilities.
Potential Impact
For European organizations using Maccms10 version 2025.1000.4050, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized data disclosure or tampering, impacting data confidentiality and integrity. Given that Maccms10 is used primarily for media content management, organizations relying on it for publishing or streaming services could face service disruptions or reputational damage if attackers manipulate content or gain unauthorized access to backend data. The fact that exploitation requires high privileges somewhat limits the risk to internal threat actors or attackers who have already compromised lower-level accounts. However, if attackers gain such privileges, they could leverage this vulnerability to deepen their access or exfiltrate sensitive information. In the European context, data protection regulations such as GDPR impose strict requirements on data security; a breach resulting from this vulnerability could lead to regulatory penalties and loss of customer trust. Additionally, media and entertainment sectors, which are significant in Europe, could be targeted to disrupt services or steal intellectual property.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Maccms10 to a patched version once available from the vendor. In the absence of an official patch, administrators should implement strict input validation and sanitization on all parameters passed to the 'rep' function, especially the 'where' argument, to prevent injection of malicious SQL code. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this endpoint can provide a temporary protective layer. Restricting database user privileges to the minimum necessary can reduce the impact of a successful injection. Regularly auditing and monitoring database queries and application logs for anomalous activity related to the 'rep' function can help detect exploitation attempts early. Additionally, network segmentation and limiting administrative access to trusted IPs can reduce the attack surface. Organizations should also conduct security awareness training for administrators to recognize and respond to suspicious activities promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-08T15:16:57.456Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68bf9505d5a2966cfc85b355
Added to database: 9/9/2025, 2:46:29 AM
Last enriched: 9/9/2025, 3:01:35 AM
Last updated: 9/9/2025, 8:35:36 AM
Views: 8
Related Threats
CVE-2025-48208: CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') in Apache Software Foundation Apache HertzBeat (incubating)
HighCVE-2025-24404: CWE-91 XML Injection (aka Blind XPath Injection) in Apache Software Foundation Apache HertzBeat (incubating)
HighCVE-2025-59019: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 TYPO3 CMS
MediumCVE-2025-59018: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 TYPO3 CMS
HighCVE-2025-59017: CWE-862 Missing Authorization in TYPO3 TYPO3 CMS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.