Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11314: SQL Injection in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统

0
Medium
VulnerabilityCVE-2025-11314cvecve-2025-11314
Published: Mon Oct 06 2025 (10/06/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Tipray 厦门天锐科技股份有限公司
Product: Data Leakage Prevention System 天锐数据泄露防护系统

Description

A vulnerability has been found in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. Affected is the function findRolePage of the file findSingConfigPage.do. Such manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/06/2025, 02:04:33 UTC

Technical Analysis

CVE-2025-11314 identifies a SQL injection vulnerability in the Tipray Data Leakage Prevention System (DLP) version 1.0, developed by 厦门天锐科技股份有限公司. The flaw exists in the findRolePage function within the findSingConfigPage.do endpoint, where the 'sort' parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This vulnerability can be exploited remotely without requiring authentication or user interaction, making it particularly dangerous. The injection can lead to unauthorized reading, modification, or deletion of database contents, potentially exposing sensitive data or disrupting system operations. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation and the partial impact on confidentiality, integrity, and availability. The vendor was notified but did not respond or provide a patch, and while no active exploits are currently reported, the public disclosure of the exploit code increases the risk of attacks. The vulnerability affects only version 1.0 of the product, and no mitigations or patches have been officially released. Organizations relying on this DLP system should consider immediate protective measures to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data protected by the Tipray DLP system. Successful exploitation could lead to unauthorized data leakage, manipulation, or deletion, undermining compliance with data protection regulations such as GDPR. The availability of the DLP system could also be affected, potentially disrupting data monitoring and protection workflows. Given the remote and unauthenticated nature of the attack vector, threat actors could exploit this vulnerability to gain footholds within corporate networks or exfiltrate critical information. The lack of vendor response and patch availability increases the urgency for European entities to implement compensating controls. Organizations in sectors with high data sensitivity, such as finance, healthcare, and government, are particularly at risk. Additionally, the exposure could damage organizational reputation and lead to regulatory penalties if data breaches occur.

Mitigation Recommendations

1. Implement strict input validation and sanitization on all user-supplied parameters, especially the 'sort' argument in the affected endpoint, to prevent SQL injection. 2. Deploy and fine-tune Web Application Firewalls (WAFs) to detect and block SQL injection attempts targeting the vulnerable endpoint. 3. Restrict network access to the DLP system, limiting exposure to trusted internal networks and VPNs to reduce the attack surface. 4. Conduct thorough code reviews and penetration testing focused on SQL injection vectors within the application. 5. Monitor logs for suspicious database queries or unusual access patterns indicative of exploitation attempts. 6. If feasible, isolate the affected system in a segmented network zone to contain potential breaches. 7. Engage with the vendor or community for updates or unofficial patches and consider alternative DLP solutions if remediation is delayed. 8. Educate security teams about this specific vulnerability to ensure rapid detection and response to exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-05T06:06:49.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e3200d94eb61166fa26433

Added to database: 10/6/2025, 1:49:01 AM

Last enriched: 10/6/2025, 2:04:33 AM

Last updated: 10/7/2025, 6:05:34 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats