CVE-2025-11313: SQL Injection in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统
A flaw has been found in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. This impacts the function findRolePage of the file findRolePage.do. This manipulation of the argument sort causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11313 identifies a SQL injection vulnerability in version 1.0 of the Tipray Data Leakage Prevention System (天锐数据泄露防护系统), specifically within the findRolePage function of the findRolePage.do endpoint. The vulnerability arises from improper sanitization of the 'sort' parameter, which an attacker can manipulate to inject malicious SQL statements. This flaw allows remote, unauthenticated attackers to execute arbitrary SQL commands against the backend database, potentially leading to unauthorized data access, modification, or deletion. The vulnerability is exploitable without any user interaction or authentication, increasing its risk profile. The CVSS 4.0 score of 6.9 (medium severity) reflects the moderate impact on confidentiality, integrity, and availability, with low complexity and no privileges required. Although no active exploitation has been reported, a public exploit exists, raising the likelihood of future attacks. The vendor, Tipray 厦门天锐科技股份有限公司, was notified but has not issued any patches or advisories, leaving systems exposed. This vulnerability is critical for organizations relying on this DLP system to protect sensitive data, as exploitation could lead to data leakage or compromise of security controls.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive data protected by the Tipray Data Leakage Prevention System, undermining confidentiality and potentially violating data protection regulations such as GDPR. Integrity of data could be compromised if attackers modify or delete records via SQL injection. Availability may also be affected if injected queries cause database errors or service disruptions. Organizations in sectors such as finance, healthcare, or government using this product are at heightened risk due to the sensitive nature of their data. The lack of vendor response and patches increases exposure time, raising the risk of targeted attacks. Additionally, the presence of a public exploit lowers the barrier for attackers, including cybercriminals and state-sponsored actors, to leverage this vulnerability. This could lead to reputational damage, regulatory penalties, and operational disruptions for affected European entities.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, deploy web application firewalls (WAFs) with robust SQL injection detection and prevention rules tailored to the findRolePage.do endpoint and the 'sort' parameter. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those influencing database queries. Restrict database user permissions to the minimum necessary to limit the impact of potential injection. Monitor database logs and application behavior for anomalous queries or access patterns indicative of exploitation attempts. Network segmentation should isolate the DLP system from critical infrastructure to contain potential breaches. Engage in proactive threat hunting for signs of compromise related to this vulnerability. Finally, maintain close monitoring of vendor communications for any future patches or advisories and plan for timely updates once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11313: SQL Injection in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统
Description
A flaw has been found in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. This impacts the function findRolePage of the file findRolePage.do. This manipulation of the argument sort causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11313 identifies a SQL injection vulnerability in version 1.0 of the Tipray Data Leakage Prevention System (天锐数据泄露防护系统), specifically within the findRolePage function of the findRolePage.do endpoint. The vulnerability arises from improper sanitization of the 'sort' parameter, which an attacker can manipulate to inject malicious SQL statements. This flaw allows remote, unauthenticated attackers to execute arbitrary SQL commands against the backend database, potentially leading to unauthorized data access, modification, or deletion. The vulnerability is exploitable without any user interaction or authentication, increasing its risk profile. The CVSS 4.0 score of 6.9 (medium severity) reflects the moderate impact on confidentiality, integrity, and availability, with low complexity and no privileges required. Although no active exploitation has been reported, a public exploit exists, raising the likelihood of future attacks. The vendor, Tipray 厦门天锐科技股份有限公司, was notified but has not issued any patches or advisories, leaving systems exposed. This vulnerability is critical for organizations relying on this DLP system to protect sensitive data, as exploitation could lead to data leakage or compromise of security controls.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive data protected by the Tipray Data Leakage Prevention System, undermining confidentiality and potentially violating data protection regulations such as GDPR. Integrity of data could be compromised if attackers modify or delete records via SQL injection. Availability may also be affected if injected queries cause database errors or service disruptions. Organizations in sectors such as finance, healthcare, or government using this product are at heightened risk due to the sensitive nature of their data. The lack of vendor response and patches increases exposure time, raising the risk of targeted attacks. Additionally, the presence of a public exploit lowers the barrier for attackers, including cybercriminals and state-sponsored actors, to leverage this vulnerability. This could lead to reputational damage, regulatory penalties, and operational disruptions for affected European entities.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. First, deploy web application firewalls (WAFs) with robust SQL injection detection and prevention rules tailored to the findRolePage.do endpoint and the 'sort' parameter. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those influencing database queries. Restrict database user permissions to the minimum necessary to limit the impact of potential injection. Monitor database logs and application behavior for anomalous queries or access patterns indicative of exploitation attempts. Network segmentation should isolate the DLP system from critical infrastructure to contain potential breaches. Engage in proactive threat hunting for signs of compromise related to this vulnerability. Finally, maintain close monitoring of vendor communications for any future patches or advisories and plan for timely updates once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-05T06:06:47.070Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e3200d94eb61166fa2642b
Added to database: 10/6/2025, 1:49:01 AM
Last enriched: 10/6/2025, 2:04:45 AM
Last updated: 10/7/2025, 12:00:55 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34251: CWE-269 Improper Privilege Management in Tesla Telematics Control Unit (TCU)
HighCVE-2025-43824: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-61768: CWE-20: Improper Input Validation in xuemian168 kuno
MediumCVE-2025-59452: CWE-340 Generation of Predictable Numbers or Identifiers in YoSmart YoLink API
MediumCVE-2025-59451: CWE-863 Incorrect Authorization in YoSmart YoLink application
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.