Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10351: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Melis Technology Melis Platform

0
Critical
VulnerabilityCVE-2025-10351cvecve-2025-10351cwe-89
Published: Wed Oct 08 2025 (10/08/2025, 10:45:36 UTC)
Source: CVE Database V5
Vendor/Project: Melis Technology
Product: Melis Platform

Description

SQL injection vulnerability based on the melis-cms module of the Melis platform from Melis Technology. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'idPage' parameter in the '/melis/MelisCms/PageEdition/getTinyTemplates' endpoint.

AI-Powered Analysis

AILast updated: 10/08/2025, 11:08:46 UTC

Technical Analysis

CVE-2025-10351 is a critical SQL injection vulnerability identified in the Melis Technology Melis Platform, specifically affecting the melis-cms module. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89), allowing attackers to inject malicious SQL code through the 'idPage' parameter in the '/melis/MelisCms/PageEdition/getTinyTemplates' endpoint. This endpoint fails to properly sanitize or parameterize user input, enabling attackers to manipulate backend SQL queries. Exploitation requires no authentication or user interaction, making it trivially exploitable remotely over the network. Successful exploitation can lead to unauthorized access to the database, allowing attackers to retrieve sensitive information, create, update, or delete database records, potentially compromising confidentiality, integrity, and availability of the affected systems. The vulnerability has been assigned a CVSS 4.0 base score of 9.3, reflecting its critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability’s characteristics suggest it could be weaponized rapidly. The affected version is listed as '0', which likely indicates an initial or early release version of the Melis Platform. The lack of available patches or mitigations from the vendor at the time of publication increases the urgency for organizations to implement compensating controls. The vulnerability was reserved and published by INCIBE, a respected European cybersecurity entity, indicating regional awareness and relevance.

Potential Impact

For European organizations, the impact of CVE-2025-10351 is significant due to the critical nature of the vulnerability and the potential for full database compromise. Organizations using the Melis Platform in sectors such as government, finance, healthcare, or critical infrastructure could face severe data breaches, data loss, or service disruption. The ability to manipulate database contents can lead to unauthorized disclosure of sensitive personal or corporate data, violation of GDPR and other data protection regulations, and operational downtime. Attackers could also leverage this vulnerability to pivot into other parts of the network or implant persistent backdoors. The lack of authentication requirements and ease of exploitation increase the risk of widespread automated attacks. European entities relying on Melis for content management or web services must consider the reputational, legal, and financial consequences of exploitation. Additionally, the vulnerability could be exploited for ransomware or data destruction campaigns, further amplifying its impact.

Mitigation Recommendations

1. Immediate implementation of input validation and sanitization on the 'idPage' parameter to prevent malicious SQL code injection. 2. Employ parameterized queries or prepared statements in the affected endpoint to ensure SQL commands are safely constructed. 3. Conduct a thorough code review of the melis-cms module and other components for similar injection flaws. 4. Monitor database logs and application logs for unusual queries or access patterns indicative of exploitation attempts. 5. Restrict network access to the vulnerable endpoint using firewalls or web application firewalls (WAFs) with specific rules to detect and block SQL injection payloads. 6. If possible, isolate the database with strict access controls and least privilege principles to limit damage from a successful attack. 7. Engage with Melis Technology for official patches or updates and apply them promptly once available. 8. Perform penetration testing and vulnerability scanning focused on SQL injection vectors to identify residual risks. 9. Educate development teams on secure coding practices to prevent recurrence of injection vulnerabilities. 10. Prepare incident response plans specific to database compromise scenarios to reduce response time if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-09-12T10:35:00.611Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e642d5f468503fc453c258

Added to database: 10/8/2025, 10:54:13 AM

Last enriched: 10/8/2025, 11:08:46 AM

Last updated: 10/8/2025, 11:57:29 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats