CVE-2025-10662: SQL Injection in SeaCMS
A vulnerability has been found in SeaCMS up to 13.3. The impacted element is an unknown function of the file /admin_members.php?ac=editsave. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This affects another injection point than CVE-2025-25513.
AI Analysis
Technical Summary
CVE-2025-10662 is a SQL Injection vulnerability identified in SeaCMS versions up to 13.3, specifically affecting an unknown function within the /admin_members.php file when accessed with the parameter ac=editsave. The vulnerability arises from improper sanitization or validation of the 'ID' argument, allowing an attacker to inject malicious SQL code remotely without requiring user interaction. This injection flaw can be exploited to manipulate the backend database queries, potentially leading to unauthorized data access, data modification, or disruption of database integrity. Notably, this vulnerability differs from CVE-2025-25513, affecting a separate injection point within the same CMS. The CVSS 4.0 score of 5.1 (medium severity) reflects that the attack vector is network-based with low complexity and no user interaction needed; however, it requires high privileges (PR:H), indicating that an attacker must have some level of authenticated access to exploit it. The impact on confidentiality, integrity, and availability is limited but present, with low to moderate potential consequences. No public exploits have been reported in the wild yet, but the disclosure of the exploit details increases the risk of future exploitation. The absence of patches at the time of publication suggests that organizations using SeaCMS versions 13.0 through 13.3 remain vulnerable until updates or mitigations are applied.
Potential Impact
For European organizations using SeaCMS, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of member-related data managed through the CMS. Since the vulnerability requires authenticated access with high privileges, the threat is more significant for internal users or attackers who have compromised credentials. Exploitation could lead to unauthorized data exposure, modification of user records, or disruption of CMS functionality, potentially affecting business operations and user trust. Organizations in sectors with sensitive member data, such as membership-based services, educational institutions, or community platforms, could face reputational damage and compliance issues under GDPR if personal data is compromised. The remote exploitability increases the attack surface, especially if administrative access is exposed over the internet or weak access controls exist. However, the medium severity and requirement for high privileges somewhat limit the scope of impact compared to more severe injection vulnerabilities.
Mitigation Recommendations
European organizations should immediately audit their SeaCMS installations to identify affected versions (13.0 to 13.3). Until official patches are released, they should implement strict access controls to limit administrative interface exposure, including IP whitelisting and VPN-only access for admin panels. Enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all users with administrative privileges to reduce the risk of credential compromise. Conduct thorough input validation and sanitization on all parameters, especially the 'ID' argument in /admin_members.php, possibly by deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this endpoint. Regularly monitor logs for suspicious activity related to the editsave function and unusual database queries. Additionally, organizations should prepare for rapid patch deployment once SeaCMS releases an official fix and consider isolating or segmenting CMS servers to minimize lateral movement in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10662: SQL Injection in SeaCMS
Description
A vulnerability has been found in SeaCMS up to 13.3. The impacted element is an unknown function of the file /admin_members.php?ac=editsave. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This affects another injection point than CVE-2025-25513.
AI-Powered Analysis
Technical Analysis
CVE-2025-10662 is a SQL Injection vulnerability identified in SeaCMS versions up to 13.3, specifically affecting an unknown function within the /admin_members.php file when accessed with the parameter ac=editsave. The vulnerability arises from improper sanitization or validation of the 'ID' argument, allowing an attacker to inject malicious SQL code remotely without requiring user interaction. This injection flaw can be exploited to manipulate the backend database queries, potentially leading to unauthorized data access, data modification, or disruption of database integrity. Notably, this vulnerability differs from CVE-2025-25513, affecting a separate injection point within the same CMS. The CVSS 4.0 score of 5.1 (medium severity) reflects that the attack vector is network-based with low complexity and no user interaction needed; however, it requires high privileges (PR:H), indicating that an attacker must have some level of authenticated access to exploit it. The impact on confidentiality, integrity, and availability is limited but present, with low to moderate potential consequences. No public exploits have been reported in the wild yet, but the disclosure of the exploit details increases the risk of future exploitation. The absence of patches at the time of publication suggests that organizations using SeaCMS versions 13.0 through 13.3 remain vulnerable until updates or mitigations are applied.
Potential Impact
For European organizations using SeaCMS, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of member-related data managed through the CMS. Since the vulnerability requires authenticated access with high privileges, the threat is more significant for internal users or attackers who have compromised credentials. Exploitation could lead to unauthorized data exposure, modification of user records, or disruption of CMS functionality, potentially affecting business operations and user trust. Organizations in sectors with sensitive member data, such as membership-based services, educational institutions, or community platforms, could face reputational damage and compliance issues under GDPR if personal data is compromised. The remote exploitability increases the attack surface, especially if administrative access is exposed over the internet or weak access controls exist. However, the medium severity and requirement for high privileges somewhat limit the scope of impact compared to more severe injection vulnerabilities.
Mitigation Recommendations
European organizations should immediately audit their SeaCMS installations to identify affected versions (13.0 to 13.3). Until official patches are released, they should implement strict access controls to limit administrative interface exposure, including IP whitelisting and VPN-only access for admin panels. Enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all users with administrative privileges to reduce the risk of credential compromise. Conduct thorough input validation and sanitization on all parameters, especially the 'ID' argument in /admin_members.php, possibly by deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this endpoint. Regularly monitor logs for suspicious activity related to the editsave function and unusual database queries. Additionally, organizations should prepare for rapid patch deployment once SeaCMS releases an official fix and consider isolating or segmenting CMS servers to minimize lateral movement in case of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-18T05:13:09.581Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cc0cd80f883ea1bda59c33
Added to database: 9/18/2025, 1:44:56 PM
Last enriched: 9/18/2025, 1:45:16 PM
Last updated: 11/2/2025, 5:52:40 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12598: SQL Injection in SourceCodester Best House Rental Management System
MediumCVE-2025-12597: SQL Injection in SourceCodester Best House Rental Management System
MediumCVE-2025-12596: Buffer Overflow in Tenda AC23
HighCVE-2025-12595: Buffer Overflow in Tenda AC23
HighCVE-2025-12594: SQL Injection in code-projects Simple Online Hotel Reservation System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.