Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11313: SQL Injection in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统

0
Medium
VulnerabilityCVE-2025-11313cvecve-2025-11313
Published: Mon Oct 06 2025 (10/06/2025, 01:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Tipray 厦门天锐科技股份有限公司
Product: Data Leakage Prevention System 天锐数据泄露防护系统

Description

A flaw has been found in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. This impacts the function findRolePage of the file findRolePage.do. This manipulation of the argument sort causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/06/2025, 02:04:45 UTC

Technical Analysis

CVE-2025-11313 identifies a SQL injection vulnerability in version 1.0 of the Tipray Data Leakage Prevention System (天锐数据泄露防护系统), specifically within the findRolePage function of the findRolePage.do endpoint. The vulnerability arises from improper sanitization of the 'sort' parameter, which an attacker can manipulate to inject malicious SQL statements. This flaw allows remote, unauthenticated attackers to execute arbitrary SQL commands against the backend database, potentially leading to unauthorized data access, modification, or deletion. The vulnerability is exploitable without any user interaction or authentication, increasing its risk profile. The CVSS 4.0 score of 6.9 (medium severity) reflects the moderate impact on confidentiality, integrity, and availability, with low complexity and no privileges required. Although no active exploitation has been reported, a public exploit exists, raising the likelihood of future attacks. The vendor, Tipray 厦门天锐科技股份有限公司, was notified but has not issued any patches or advisories, leaving systems exposed. This vulnerability is critical for organizations relying on this DLP system to protect sensitive data, as exploitation could lead to data leakage or compromise of security controls.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive data protected by the Tipray Data Leakage Prevention System, undermining confidentiality and potentially violating data protection regulations such as GDPR. Integrity of data could be compromised if attackers modify or delete records via SQL injection. Availability may also be affected if injected queries cause database errors or service disruptions. Organizations in sectors such as finance, healthcare, or government using this product are at heightened risk due to the sensitive nature of their data. The lack of vendor response and patches increases exposure time, raising the risk of targeted attacks. Additionally, the presence of a public exploit lowers the barrier for attackers, including cybercriminals and state-sponsored actors, to leverage this vulnerability. This could lead to reputational damage, regulatory penalties, and operational disruptions for affected European entities.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, deploy web application firewalls (WAFs) with robust SQL injection detection and prevention rules tailored to the findRolePage.do endpoint and the 'sort' parameter. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those influencing database queries. Restrict database user permissions to the minimum necessary to limit the impact of potential injection. Monitor database logs and application behavior for anomalous queries or access patterns indicative of exploitation attempts. Network segmentation should isolate the DLP system from critical infrastructure to contain potential breaches. Engage in proactive threat hunting for signs of compromise related to this vulnerability. Finally, maintain close monitoring of vendor communications for any future patches or advisories and plan for timely updates once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-05T06:06:47.070Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e3200d94eb61166fa2642b

Added to database: 10/6/2025, 1:49:01 AM

Last enriched: 10/6/2025, 2:04:45 AM

Last updated: 10/7/2025, 12:00:55 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats