CVE-2025-11310: SQL Injection in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统
A weakness has been identified in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. The affected element is the function findFileServerPage of the file findFileServerPage.do. Executing manipulation of the argument sort can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11310 identifies a SQL injection vulnerability in version 1.0 of the Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System (天锐数据泄露防护系统). The vulnerability resides in the findFileServerPage.do endpoint, specifically within the findFileServerPage function. An attacker can manipulate the 'sort' parameter to inject malicious SQL commands, enabling unauthorized database queries or modifications. This attack vector requires no authentication or user interaction and can be executed remotely over the network. The SQL injection could lead to unauthorized data disclosure, data tampering, or denial of service by corrupting database integrity or exhausting resources. The vendor was notified but has not issued any patches or advisories, and no known exploits have been observed in the wild yet, although proof-of-concept exploits are publicly available. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity due to its network attack vector, lack of required privileges, and potential impact on confidentiality, integrity, and availability. The absence of vendor response increases risk as organizations must rely on defensive controls and mitigations. This vulnerability is critical for organizations relying on this DLP system to protect sensitive data, as exploitation could bypass data protection controls and expose confidential information.
Potential Impact
For European organizations, exploitation of CVE-2025-11310 could result in significant data breaches, exposing sensitive corporate or personal data protected by the Data Leakage Prevention system. This undermines compliance with GDPR and other data protection regulations, potentially leading to legal penalties and reputational damage. Integrity of stored data could be compromised, affecting business operations and decision-making. Availability impacts may arise if attackers corrupt database contents or disrupt system functionality, causing downtime or degraded service. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch automated attacks at scale, increasing risk. Organizations in sectors such as finance, healthcare, and government, which often deploy DLP solutions, are particularly vulnerable. The lack of vendor patches forces reliance on compensating controls, increasing operational complexity and risk exposure. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical data protection infrastructure in European enterprises.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on all user-supplied parameters, especially the 'sort' argument, to block SQL injection payloads. Deploy Web Application Firewalls (WAFs) with custom rules targeting SQL injection patterns specific to this vulnerability. Monitor database query logs and application logs for unusual or anomalous queries indicative of exploitation attempts. Restrict network access to the affected endpoint to trusted IPs or internal networks where feasible. Conduct regular security assessments and penetration tests focusing on injection vulnerabilities. Consider isolating or segmenting the DLP system within the network to limit lateral movement if compromised. Maintain up-to-date backups of critical data to enable recovery in case of data corruption. Engage with the vendor for updates and monitor security advisories for patches or mitigations. Finally, educate security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands
CVE-2025-11310: SQL Injection in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统
Description
A weakness has been identified in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. The affected element is the function findFileServerPage of the file findFileServerPage.do. Executing manipulation of the argument sort can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11310 identifies a SQL injection vulnerability in version 1.0 of the Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System (天锐数据泄露防护系统). The vulnerability resides in the findFileServerPage.do endpoint, specifically within the findFileServerPage function. An attacker can manipulate the 'sort' parameter to inject malicious SQL commands, enabling unauthorized database queries or modifications. This attack vector requires no authentication or user interaction and can be executed remotely over the network. The SQL injection could lead to unauthorized data disclosure, data tampering, or denial of service by corrupting database integrity or exhausting resources. The vendor was notified but has not issued any patches or advisories, and no known exploits have been observed in the wild yet, although proof-of-concept exploits are publicly available. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity due to its network attack vector, lack of required privileges, and potential impact on confidentiality, integrity, and availability. The absence of vendor response increases risk as organizations must rely on defensive controls and mitigations. This vulnerability is critical for organizations relying on this DLP system to protect sensitive data, as exploitation could bypass data protection controls and expose confidential information.
Potential Impact
For European organizations, exploitation of CVE-2025-11310 could result in significant data breaches, exposing sensitive corporate or personal data protected by the Data Leakage Prevention system. This undermines compliance with GDPR and other data protection regulations, potentially leading to legal penalties and reputational damage. Integrity of stored data could be compromised, affecting business operations and decision-making. Availability impacts may arise if attackers corrupt database contents or disrupt system functionality, causing downtime or degraded service. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch automated attacks at scale, increasing risk. Organizations in sectors such as finance, healthcare, and government, which often deploy DLP solutions, are particularly vulnerable. The lack of vendor patches forces reliance on compensating controls, increasing operational complexity and risk exposure. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical data protection infrastructure in European enterprises.
Mitigation Recommendations
Given the absence of vendor patches, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on all user-supplied parameters, especially the 'sort' argument, to block SQL injection payloads. Deploy Web Application Firewalls (WAFs) with custom rules targeting SQL injection patterns specific to this vulnerability. Monitor database query logs and application logs for unusual or anomalous queries indicative of exploitation attempts. Restrict network access to the affected endpoint to trusted IPs or internal networks where feasible. Conduct regular security assessments and penetration tests focusing on injection vulnerabilities. Consider isolating or segmenting the DLP system within the network to limit lateral movement if compromised. Maintain up-to-date backups of critical data to enable recovery in case of data corruption. Engage with the vendor for updates and monitor security advisories for patches or mitigations. Finally, educate security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T06:06:39.119Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e301c443279ad048c580f0
Added to database: 10/5/2025, 11:39:48 PM
Last enriched: 10/13/2025, 12:39:47 AM
Last updated: 11/20/2025, 3:24:36 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumCVE-2025-13446: Stack-based Buffer Overflow in Tenda AC21
HighApplication Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.