CVE-2025-10712: SQL Injection in 07FLYCMS
A vulnerability was found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This issue affects some unknown processing of the file /index.php/Login/login. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10712 is a SQL Injection vulnerability identified in the 07FLYCMS family of products, including 07FLYCMS, 07FLY-CMS, and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the /index.php/Login/login endpoint, specifically in the processing of the 'Username' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is low to limited, suggesting that while data exposure or modification is possible, it may be constrained by the application's design or database permissions. The vendor was notified but did not respond, and no official patches are currently available. Although no known exploits are reported in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation by attackers. The product is distributed under multiple names, which may complicate detection and mitigation efforts.
Potential Impact
For European organizations using 07FLYCMS or its variants, this vulnerability poses a tangible risk of unauthorized data access or manipulation through SQL Injection attacks. Given the remote exploitability without authentication, attackers could leverage this flaw to extract sensitive information such as user credentials, personal data, or business-critical information stored in the backend database. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial losses. The medium severity rating reflects a moderate risk; however, the lack of vendor response and patches increases the window of exposure. Organizations relying on these CMS or CRM platforms for web presence or customer management should be particularly vigilant. The impact is heightened in sectors with stringent data protection requirements or where the CMS/CRM contains sensitive customer or operational data.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection patterns targeting the login endpoint, especially the 'Username' parameter. 2) Conducting thorough input validation and sanitization at the application level to reject or neutralize malicious input, if source code access and modification are possible. 3) Restricting database user privileges to the minimum necessary, limiting the potential damage from successful injection. 4) Monitoring logs for unusual login attempts or SQL errors indicative of injection attempts. 5) Considering temporary removal or disabling of the vulnerable login functionality if feasible until a patch or vendor response is available. 6) Engaging in threat intelligence sharing with industry peers to stay informed about emerging exploits. 7) Planning migration to alternative, actively maintained CMS/CRM platforms if long-term vendor support is uncertain.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10712: SQL Injection in 07FLYCMS
Description
A vulnerability was found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This issue affects some unknown processing of the file /index.php/Login/login. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10712 is a SQL Injection vulnerability identified in the 07FLYCMS family of products, including 07FLYCMS, 07FLY-CMS, and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the /index.php/Login/login endpoint, specifically in the processing of the 'Username' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is low to limited, suggesting that while data exposure or modification is possible, it may be constrained by the application's design or database permissions. The vendor was notified but did not respond, and no official patches are currently available. Although no known exploits are reported in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation by attackers. The product is distributed under multiple names, which may complicate detection and mitigation efforts.
Potential Impact
For European organizations using 07FLYCMS or its variants, this vulnerability poses a tangible risk of unauthorized data access or manipulation through SQL Injection attacks. Given the remote exploitability without authentication, attackers could leverage this flaw to extract sensitive information such as user credentials, personal data, or business-critical information stored in the backend database. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial losses. The medium severity rating reflects a moderate risk; however, the lack of vendor response and patches increases the window of exposure. Organizations relying on these CMS or CRM platforms for web presence or customer management should be particularly vigilant. The impact is heightened in sectors with stringent data protection requirements or where the CMS/CRM contains sensitive customer or operational data.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection patterns targeting the login endpoint, especially the 'Username' parameter. 2) Conducting thorough input validation and sanitization at the application level to reject or neutralize malicious input, if source code access and modification are possible. 3) Restricting database user privileges to the minimum necessary, limiting the potential damage from successful injection. 4) Monitoring logs for unusual login attempts or SQL errors indicative of injection attempts. 5) Considering temporary removal or disabling of the vulnerable login functionality if feasible until a patch or vendor response is available. 6) Engaging in threat intelligence sharing with industry peers to stay informed about emerging exploits. 7) Planning migration to alternative, actively maintained CMS/CRM platforms if long-term vendor support is uncertain.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-19T06:07:29.051Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cd5bd4829848b34320abb7
Added to database: 9/19/2025, 1:34:12 PM
Last enriched: 9/19/2025, 1:34:57 PM
Last updated: 9/19/2025, 3:30:00 PM
Views: 4
Related Threats
CVE-2025-55910: n/a
HighCVE-2025-59427: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in cloudflare workers-sdk
LowCVE-2025-10647: CWE-434 Unrestricted Upload of File with Dangerous Type in salzano Embed PDF for WPForms
HighCVE-2025-10630: CWE-20 Improper Input Validation in Grafana grafana-zabbix-plugin
MediumCVE-2025-7702: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Pusula Communication Information Internet Industry and Trade Ltd. Co. Manageable Email Sending System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.