Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13171: SQL Injection in ZZCMS

0
Medium
VulnerabilityCVE-2025-13171cvecve-2025-13171
Published: Fri Nov 14 2025 (11/14/2025, 17:32:05 UTC)
Source: CVE Database V5
Product: ZZCMS

Description

A vulnerability was identified in ZZCMS 2023. This impacts an unknown function of the file /admin/wangkan_list.php. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:21:17 UTC

Technical Analysis

CVE-2025-13171 is a SQL injection vulnerability identified in the 2023 version of ZZCMS, a content management system. The flaw exists in the /admin/wangkan_list.php file, where the 'keyword' parameter is insufficiently sanitized, enabling attackers to inject arbitrary SQL queries remotely. This vulnerability does not require user interaction or authentication, making it accessible to unauthenticated remote attackers. The injection can lead to unauthorized data disclosure, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the backend database. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no exploits have been observed in the wild, public exploit code is available, increasing the likelihood of exploitation. The lack of patches or official fixes at the time of publication necessitates immediate mitigation efforts. The vulnerability affects all installations running ZZCMS 2023, particularly those exposing the admin interface to the internet without adequate protections.

Potential Impact

The SQL injection vulnerability allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized access to sensitive data such as user credentials, personal information, or business-critical content. Attackers could modify or delete data, disrupting website functionality and causing data integrity issues. The availability of the CMS could be impacted if attackers perform destructive queries or cause database errors. Since the vulnerability requires no authentication, it poses a significant risk to any exposed ZZCMS 2023 installations. Organizations relying on ZZCMS for their web presence or internal portals may face data breaches, reputational damage, and operational disruptions. The presence of public exploit code increases the risk of automated attacks and widespread exploitation, especially in environments lacking proper network segmentation or input validation controls.

Mitigation Recommendations

1. Immediately restrict access to the /admin/wangkan_list.php endpoint by IP whitelisting or VPN-only access to limit exposure. 2. Implement robust input validation and sanitization on the 'keyword' parameter to prevent injection of malicious SQL code. 3. Employ prepared statements or parameterized queries in the application code to eliminate direct concatenation of user inputs into SQL queries. 4. Monitor database logs and web server logs for unusual query patterns or repeated failed attempts targeting the vulnerable parameter. 5. If possible, deploy a Web Application Firewall (WAF) with custom rules to detect and block SQL injection attempts targeting ZZCMS. 6. Regularly back up databases and test restoration procedures to minimize impact in case of data corruption or deletion. 7. Engage with ZZCMS developers or community to obtain official patches or updates addressing this vulnerability. 8. Conduct security audits and penetration testing focused on input validation and authentication controls for administrative interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T10:09:44.459Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69176937db1bcd4e0c856804

Added to database: 11/14/2025, 5:39:03 PM

Last enriched: 2/24/2026, 10:21:17 PM

Last updated: 3/24/2026, 9:44:57 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses