Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13171: SQL Injection in ZZCMS

0
Medium
VulnerabilityCVE-2025-13171cvecve-2025-13171
Published: Fri Nov 14 2025 (11/14/2025, 17:32:05 UTC)
Source: CVE Database V5
Product: ZZCMS

Description

A vulnerability was identified in ZZCMS 2023. This impacts an unknown function of the file /admin/wangkan_list.php. Such manipulation of the argument keyword leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 11/14/2025, 17:54:57 UTC

Technical Analysis

CVE-2025-13171 identifies a SQL injection vulnerability in the 2023 version of ZZCMS, a content management system. The vulnerability exists in the /admin/wangkan_list.php file, where the 'keyword' parameter is improperly sanitized, allowing attackers to inject arbitrary SQL commands. This injection flaw can be exploited remotely without requiring user interaction or prior authentication, making it accessible to a wide range of attackers. The vulnerability impacts confidentiality, integrity, and availability, though to a limited extent (low impact on each). The CVSS 4.0 vector indicates no privileges required (PR:L means low privileges), no user interaction needed, and no scope change, but the attack complexity is low. The exploit code is publicly available, increasing the risk of exploitation despite no known active attacks reported. The vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt service availability. The lack of official patches or mitigation links suggests that organizations must implement defensive coding practices or restrict access to vulnerable endpoints. This vulnerability underscores the importance of secure input handling in web applications, especially in administrative modules that control critical content management functions.

Potential Impact

For European organizations, the impact of CVE-2025-13171 can be significant if ZZCMS 2023 is used to manage critical websites or internal portals. Successful exploitation could lead to unauthorized data disclosure, data tampering, or partial service disruption. This could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational interruptions. The medium severity rating reflects moderate risk, but the ease of remote exploitation without authentication raises concerns for organizations with exposed admin interfaces. Attackers could leverage this vulnerability to pivot into deeper network segments or escalate privileges if combined with other vulnerabilities. Sensitive sectors such as government, finance, healthcare, and media in Europe could be targeted due to the strategic value of their data and services. The absence of known active exploitation provides a window for proactive defense, but the public availability of exploit code increases the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately audit their use of ZZCMS 2023 and identify any exposed /admin/wangkan_list.php endpoints. Specific mitigations include: 1) Implement strict input validation and sanitization on the 'keyword' parameter to prevent SQL injection. 2) Employ parameterized queries or prepared statements in the backend code to eliminate direct SQL concatenation. 3) Restrict access to the admin interface by IP whitelisting, VPN, or multi-factor authentication to reduce exposure. 4) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 5) If possible, isolate the CMS environment from critical internal networks to limit lateral movement. 6) Engage with ZZCMS developers or community to obtain patches or updates addressing this vulnerability. 7) Conduct penetration testing focused on SQL injection vectors to verify remediation effectiveness. 8) Educate administrators on the risks of exposing admin panels publicly and enforce strong credential policies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T10:09:44.459Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69176937db1bcd4e0c856804

Added to database: 11/14/2025, 5:39:03 PM

Last enriched: 11/14/2025, 5:54:57 PM

Last updated: 11/15/2025, 7:40:46 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats