Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10762: SQL Injection in kuaifan DooTask

0
Medium
VulnerabilityCVE-2025-10762cvecve-2025-10762
Published: Sun Sep 21 2025 (09/21/2025, 04:32:06 UTC)
Source: CVE Database V5
Vendor/Project: kuaifan
Product: DooTask

Description

A vulnerability was found in kuaifan DooTask up to 1.2.49. Affected by this vulnerability is an unknown functionality of the file app/Http/Controllers/Api/UsersController.php. The manipulation of the argument keys[department] results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/29/2025, 00:45:27 UTC

Technical Analysis

CVE-2025-10762 is a SQL Injection vulnerability identified in the kuaifan DooTask application, specifically affecting versions up to 1.2.49. The vulnerability exists in the file app/Http/Controllers/Api/UsersController.php, where improper sanitization of the 'keys[department]' parameter allows an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt application functionality. Although the CVSS score is medium (5.3), the exploitability is relatively straightforward due to low attack complexity and no user interaction needed. The vulnerability has been publicly disclosed, but no known exploits in the wild have been reported yet. The lack of available patches at the time of publication increases the urgency for organizations using DooTask to implement mitigations. The vulnerability’s presence in a core API controller handling user-related data suggests that exploitation could lead to significant data breaches or unauthorized data manipulation within affected systems.

Potential Impact

For European organizations utilizing kuaifan DooTask, this vulnerability poses a moderate risk with potential for significant impact. Exploitation could lead to unauthorized access to sensitive user or departmental data, undermining data confidentiality and integrity. This is particularly critical for organizations in regulated sectors such as finance, healthcare, and public administration, where data protection is mandated by GDPR and other regulations. A successful attack could result in data breaches, regulatory penalties, reputational damage, and operational disruptions. Given the remote exploitability and lack of required user interaction, attackers could automate attacks at scale, increasing the risk of widespread compromise. The medium severity score reflects a balance between exploitability and impact; however, the absence of patches and public disclosure heightens the urgency for mitigation. Organizations relying on DooTask for task or user management should be vigilant, as attackers might leverage this vulnerability to pivot within networks or exfiltrate sensitive information.

Mitigation Recommendations

Immediate mitigation steps include implementing input validation and sanitization on the 'keys[department]' parameter to prevent malicious SQL code execution. Organizations should audit their DooTask installations and restrict external access to the vulnerable API endpoint through network segmentation and firewall rules. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected parameter can provide a temporary protective layer. Monitoring application logs for unusual query patterns or errors related to SQL injection attempts is critical for early detection. Since no official patches are currently available, organizations should engage with the vendor for updates and consider applying virtual patching techniques. Additionally, limiting the privileges of the database user account used by DooTask can reduce the potential impact of exploitation. Regular backups and incident response plans should be reviewed and updated to prepare for potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T07:07:08.848Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0935fb68a0c387d42a937

Added to database: 9/22/2025, 12:07:59 AM

Last enriched: 9/29/2025, 12:45:27 AM

Last updated: 11/5/2025, 8:34:43 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats