CVE-2025-13121: SQL Injection in cameasy Liketea
A security vulnerability has been detected in cameasy Liketea 1.0.0. Impacted is the function list of the file laravel/app/Http/Controllers/Front/StoreController.php of the component API Endpoint. Such manipulation of the argument lng/lat leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-13121 identifies a SQL injection vulnerability in cameasy Liketea version 1.0.0, specifically within the list function of the StoreController.php file in the Laravel framework. The vulnerability is triggered by manipulation of the lng/lat parameters passed to the API endpoint, which are not properly sanitized or parameterized before being used in SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, lack of required privileges or user interaction, and limited scope and impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the public disclosure increases the risk of exploitation attempts. The affected component is part of the API endpoint handling store-related data, which could expose sensitive business or customer information if compromised. The vulnerability stems from insecure coding practices, such as directly embedding user-controlled input into SQL queries without proper escaping or use of prepared statements. This flaw is typical in web applications that fail to enforce strict input validation and secure database interaction patterns.
Potential Impact
For European organizations using cameasy Liketea 1.0.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Exploitation could lead to unauthorized access to sensitive customer or business data, data corruption, or disruption of service availability. Retailers and e-commerce platforms relying on this software could suffer financial losses, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The remote, unauthenticated nature of the attack vector increases the likelihood of exploitation by external threat actors, including cybercriminals targeting European markets. Additionally, the public disclosure of the vulnerability may lead to automated scanning and exploitation attempts, increasing the urgency for mitigation. The impact is particularly critical for organizations with large customer databases or those integrated with payment processing systems. Operational disruptions could also arise if attackers manipulate or delete critical data, affecting business continuity.
Mitigation Recommendations
1. Immediate application of vendor patches or updates once available is the most effective mitigation. 2. In the absence of patches, implement strict input validation and sanitization on the lng/lat parameters at the API gateway or web application firewall (WAF) level to block malicious payloads. 3. Refactor the vulnerable code to use prepared statements or parameterized queries to prevent SQL injection. 4. Employ runtime application self-protection (RASP) tools to detect and block injection attempts in real-time. 5. Monitor API logs and network traffic for unusual query patterns or spikes in error rates indicative of exploitation attempts. 6. Conduct code audits and penetration testing focused on input handling and database interactions to identify and remediate similar vulnerabilities. 7. Educate developers on secure coding practices, emphasizing the dangers of unsanitized input in SQL queries. 8. Limit database user privileges to the minimum necessary to reduce the impact of a successful injection attack. 9. Deploy anomaly detection systems to alert on suspicious activities related to the affected API endpoints. 10. Prepare incident response plans tailored to SQL injection incidents to minimize damage and recovery time.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-13121: SQL Injection in cameasy Liketea
Description
A security vulnerability has been detected in cameasy Liketea 1.0.0. Impacted is the function list of the file laravel/app/Http/Controllers/Front/StoreController.php of the component API Endpoint. Such manipulation of the argument lng/lat leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13121 identifies a SQL injection vulnerability in cameasy Liketea version 1.0.0, specifically within the list function of the StoreController.php file in the Laravel framework. The vulnerability is triggered by manipulation of the lng/lat parameters passed to the API endpoint, which are not properly sanitized or parameterized before being used in SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting its network attack vector, lack of required privileges or user interaction, and limited scope and impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the public disclosure increases the risk of exploitation attempts. The affected component is part of the API endpoint handling store-related data, which could expose sensitive business or customer information if compromised. The vulnerability stems from insecure coding practices, such as directly embedding user-controlled input into SQL queries without proper escaping or use of prepared statements. This flaw is typical in web applications that fail to enforce strict input validation and secure database interaction patterns.
Potential Impact
For European organizations using cameasy Liketea 1.0.0, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Exploitation could lead to unauthorized access to sensitive customer or business data, data corruption, or disruption of service availability. Retailers and e-commerce platforms relying on this software could suffer financial losses, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The remote, unauthenticated nature of the attack vector increases the likelihood of exploitation by external threat actors, including cybercriminals targeting European markets. Additionally, the public disclosure of the vulnerability may lead to automated scanning and exploitation attempts, increasing the urgency for mitigation. The impact is particularly critical for organizations with large customer databases or those integrated with payment processing systems. Operational disruptions could also arise if attackers manipulate or delete critical data, affecting business continuity.
Mitigation Recommendations
1. Immediate application of vendor patches or updates once available is the most effective mitigation. 2. In the absence of patches, implement strict input validation and sanitization on the lng/lat parameters at the API gateway or web application firewall (WAF) level to block malicious payloads. 3. Refactor the vulnerable code to use prepared statements or parameterized queries to prevent SQL injection. 4. Employ runtime application self-protection (RASP) tools to detect and block injection attempts in real-time. 5. Monitor API logs and network traffic for unusual query patterns or spikes in error rates indicative of exploitation attempts. 6. Conduct code audits and penetration testing focused on input handling and database interactions to identify and remediate similar vulnerabilities. 7. Educate developers on secure coding practices, emphasizing the dangers of unsanitized input in SQL queries. 8. Limit database user privileges to the minimum necessary to reduce the impact of a successful injection attack. 9. Deploy anomaly detection systems to alert on suspicious activities related to the affected API endpoints. 10. Prepare incident response plans tailored to SQL injection incidents to minimize damage and recovery time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-13T12:05:30.795Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69160aa2eb29b6dceb121465
Added to database: 11/13/2025, 4:43:14 PM
Last enriched: 11/20/2025, 5:14:38 PM
Last updated: 12/28/2025, 10:26:21 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15155: Stack-based Buffer Overflow in floooh sokol
MediumCVE-2025-15154: Use of Less Trusted Source in PbootCMS
MediumCVE-2025-15153: Files or Directories Accessible in PbootCMS
MediumCVE-2025-15152: Unrestricted Upload in h-moses moga-mall
MediumCVE-2025-15151: Password in Configuration File in TaleLin Lin-CMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.