Skip to main content

CVE-2025-10662: SQL Injection in SeaCMS

Medium
VulnerabilityCVE-2025-10662cvecve-2025-10662
Published: Thu Sep 18 2025 (09/18/2025, 10:32:05 UTC)
Source: CVE Database V5
Product: SeaCMS

Description

A vulnerability has been found in SeaCMS up to 13.3. The impacted element is an unknown function of the file /admin_members.php?ac=editsave. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This affects another injection point than CVE-2025-25513.

AI-Powered Analysis

AILast updated: 09/18/2025, 13:45:16 UTC

Technical Analysis

CVE-2025-10662 is a SQL Injection vulnerability identified in SeaCMS versions up to 13.3, specifically affecting an unknown function within the /admin_members.php file when accessed with the parameter ac=editsave. The vulnerability arises from improper sanitization or validation of the 'ID' argument, allowing an attacker to inject malicious SQL code remotely without requiring user interaction. This injection flaw can be exploited to manipulate the backend database queries, potentially leading to unauthorized data access, data modification, or disruption of database integrity. Notably, this vulnerability differs from CVE-2025-25513, affecting a separate injection point within the same CMS. The CVSS 4.0 score of 5.1 (medium severity) reflects that the attack vector is network-based with low complexity and no user interaction needed; however, it requires high privileges (PR:H), indicating that an attacker must have some level of authenticated access to exploit it. The impact on confidentiality, integrity, and availability is limited but present, with low to moderate potential consequences. No public exploits have been reported in the wild yet, but the disclosure of the exploit details increases the risk of future exploitation. The absence of patches at the time of publication suggests that organizations using SeaCMS versions 13.0 through 13.3 remain vulnerable until updates or mitigations are applied.

Potential Impact

For European organizations using SeaCMS, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of member-related data managed through the CMS. Since the vulnerability requires authenticated access with high privileges, the threat is more significant for internal users or attackers who have compromised credentials. Exploitation could lead to unauthorized data exposure, modification of user records, or disruption of CMS functionality, potentially affecting business operations and user trust. Organizations in sectors with sensitive member data, such as membership-based services, educational institutions, or community platforms, could face reputational damage and compliance issues under GDPR if personal data is compromised. The remote exploitability increases the attack surface, especially if administrative access is exposed over the internet or weak access controls exist. However, the medium severity and requirement for high privileges somewhat limit the scope of impact compared to more severe injection vulnerabilities.

Mitigation Recommendations

European organizations should immediately audit their SeaCMS installations to identify affected versions (13.0 to 13.3). Until official patches are released, they should implement strict access controls to limit administrative interface exposure, including IP whitelisting and VPN-only access for admin panels. Enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all users with administrative privileges to reduce the risk of credential compromise. Conduct thorough input validation and sanitization on all parameters, especially the 'ID' argument in /admin_members.php, possibly by deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this endpoint. Regularly monitor logs for suspicious activity related to the editsave function and unusual database queries. Additionally, organizations should prepare for rapid patch deployment once SeaCMS releases an official fix and consider isolating or segmenting CMS servers to minimize lateral movement in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-18T05:13:09.581Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cc0cd80f883ea1bda59c33

Added to database: 9/18/2025, 1:44:56 PM

Last enriched: 9/18/2025, 1:45:16 PM

Last updated: 9/18/2025, 6:34:57 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats