Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13251: SQL Injection in WeiYe-Jing datax-web

0
Medium
VulnerabilityCVE-2025-13251cvecve-2025-13251
Published: Sun Nov 16 2025 (11/16/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: WeiYe-Jing
Product: datax-web

Description

A flaw has been found in WeiYe-Jing datax-web up to 2.1.2. Affected is an unknown function. Executing manipulation can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 11/16/2025, 13:17:46 UTC

Technical Analysis

CVE-2025-13251 is a SQL injection vulnerability identified in WeiYe-Jing's datax-web product, affecting versions 2.1.0 through 2.1.2. The vulnerability arises from improper sanitization or validation of user-supplied input in an unspecified function, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without user interaction but requires low-level privileges, indicating that an attacker must have some authenticated access or leverage another vulnerability to gain initial foothold. The injection can lead to unauthorized access, modification, or deletion of database records, potentially compromising sensitive data and affecting the integrity and availability of the application. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering the attack vector is network-based, with low attack complexity and no user interaction, but requiring privileges. No patches are currently linked, and no exploits have been observed in the wild, though proof-of-concept code is publicly available, increasing the likelihood of future attacks. The vulnerability impacts organizations relying on datax-web for data integration or web services, especially where the database contains critical or sensitive information. The lack of detailed technical specifics on the vulnerable function limits precise assessment but highlights the need for immediate attention. The vulnerability's exploitation could lead to data breaches, unauthorized data manipulation, and service disruption, emphasizing the importance of timely mitigation.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized data access and manipulation, potentially leading to data breaches involving personal, financial, or operational information. Such breaches could result in regulatory penalties under GDPR, reputational damage, and operational downtime. Organizations using datax-web in critical infrastructure, finance, healthcare, or government sectors may face heightened risks due to the sensitivity of their data and the potential impact on service availability. The requirement for low privileges to exploit the vulnerability means that insider threats or attackers who have gained limited access could escalate their impact significantly. The availability of public exploit code increases the risk of opportunistic attacks, especially against organizations that delay patching or lack robust input validation and database security controls. The medium severity score suggests a moderate but tangible threat that could be leveraged as part of multi-stage attacks or combined with other vulnerabilities to achieve broader compromise.

Mitigation Recommendations

1. Monitor WeiYe-Jing vendor communications closely for official patches addressing CVE-2025-13251 and apply them promptly upon release. 2. Implement rigorous input validation and sanitization on all user inputs interacting with the datax-web application to prevent injection of malicious SQL code. 3. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for application connections. 4. Employ Web Application Firewalls (WAFs) with updated rules to detect and block SQL injection attempts targeting datax-web endpoints. 5. Conduct regular security audits and code reviews focusing on input handling and database interactions within datax-web deployments. 6. Monitor logs for unusual database queries or access patterns indicative of injection attempts. 7. Segment and isolate critical databases to limit lateral movement in case of compromise. 8. Educate administrators and developers about the risks of SQL injection and secure coding practices specific to datax-web environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-15T15:11:26.647Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6919ceee66db7136d9af53ff

Added to database: 11/16/2025, 1:17:34 PM

Last enriched: 11/16/2025, 1:17:46 PM

Last updated: 11/16/2025, 3:45:59 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats