CVE-2025-13782: SQL Injection in taosir WTCMS
A vulnerability was identified in taosir WTCMS up to 01a5f68a3dfc2fdddb44eed967bb2d4f60487665. Affected by this issue is the function delete of the file application/Admin/Controller/SlideController.class.php of the component SlideController. The manipulation of the argument ids leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13782 identifies a SQL injection vulnerability in the taosir WTCMS content management system, specifically within the delete function of the SlideController component (file: application/Admin/Controller/SlideController.class.php). The vulnerability is triggered by manipulation of the 'ids' parameter, which is not properly sanitized before being used in SQL queries. This allows remote attackers to inject malicious SQL statements, potentially leading to unauthorized data access, modification, or deletion. The vulnerability requires no authentication or user interaction, increasing its risk profile. The product follows a rolling release approach, making it difficult to pinpoint affected versions beyond the specified commit hash. Despite the vendor being notified, no patches or updates have been issued. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the network attack vector, lack of authentication, and partial impact on confidentiality, integrity, and availability. Although no confirmed exploits are reported in the wild, public exploit code exists, increasing the likelihood of exploitation. This vulnerability poses a significant risk to organizations relying on WTCMS for web content management, especially if sensitive data is stored or processed.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive data, data corruption, or denial of service conditions affecting web applications running WTCMS. This could lead to data breaches involving personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The ability to execute arbitrary SQL commands remotely without authentication increases the attack surface and potential for widespread compromise. Organizations operating critical services or handling sensitive information through WTCMS are particularly vulnerable. Additionally, the lack of vendor response and patches heightens the risk of exploitation. The rolling release nature of WTCMS complicates patch management and vulnerability tracking, potentially delaying remediation efforts. Overall, the vulnerability could disrupt business operations, compromise data integrity, and expose organizations to compliance violations.
Mitigation Recommendations
European organizations using taosir WTCMS should implement immediate mitigations to reduce risk. First, apply strict input validation and sanitization on the 'ids' parameter within the SlideController delete function, ideally by using parameterized queries or prepared statements to prevent SQL injection. If source code modification is not feasible, deploy a Web Application Firewall (WAF) with custom rules to detect and block malicious SQL injection payloads targeting the vulnerable endpoint. Monitor database logs and web server access logs for suspicious activity indicative of injection attempts. Conduct thorough code reviews and security testing on all user input handling components. Organizations should also consider isolating the WTCMS environment and restricting database user privileges to limit potential damage. Engage with the vendor or community to obtain updates or patches as they become available. Finally, maintain regular backups and have an incident response plan ready to address potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-13782: SQL Injection in taosir WTCMS
Description
A vulnerability was identified in taosir WTCMS up to 01a5f68a3dfc2fdddb44eed967bb2d4f60487665. Affected by this issue is the function delete of the file application/Admin/Controller/SlideController.class.php of the component SlideController. The manipulation of the argument ids leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13782 identifies a SQL injection vulnerability in the taosir WTCMS content management system, specifically within the delete function of the SlideController component (file: application/Admin/Controller/SlideController.class.php). The vulnerability is triggered by manipulation of the 'ids' parameter, which is not properly sanitized before being used in SQL queries. This allows remote attackers to inject malicious SQL statements, potentially leading to unauthorized data access, modification, or deletion. The vulnerability requires no authentication or user interaction, increasing its risk profile. The product follows a rolling release approach, making it difficult to pinpoint affected versions beyond the specified commit hash. Despite the vendor being notified, no patches or updates have been issued. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the network attack vector, lack of authentication, and partial impact on confidentiality, integrity, and availability. Although no confirmed exploits are reported in the wild, public exploit code exists, increasing the likelihood of exploitation. This vulnerability poses a significant risk to organizations relying on WTCMS for web content management, especially if sensitive data is stored or processed.
Potential Impact
For European organizations, exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive data, data corruption, or denial of service conditions affecting web applications running WTCMS. This could lead to data breaches involving personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The ability to execute arbitrary SQL commands remotely without authentication increases the attack surface and potential for widespread compromise. Organizations operating critical services or handling sensitive information through WTCMS are particularly vulnerable. Additionally, the lack of vendor response and patches heightens the risk of exploitation. The rolling release nature of WTCMS complicates patch management and vulnerability tracking, potentially delaying remediation efforts. Overall, the vulnerability could disrupt business operations, compromise data integrity, and expose organizations to compliance violations.
Mitigation Recommendations
European organizations using taosir WTCMS should implement immediate mitigations to reduce risk. First, apply strict input validation and sanitization on the 'ids' parameter within the SlideController delete function, ideally by using parameterized queries or prepared statements to prevent SQL injection. If source code modification is not feasible, deploy a Web Application Firewall (WAF) with custom rules to detect and block malicious SQL injection payloads targeting the vulnerable endpoint. Monitor database logs and web server access logs for suspicious activity indicative of injection attempts. Conduct thorough code reviews and security testing on all user input handling components. Organizations should also consider isolating the WTCMS environment and restricting database user privileges to limit potential damage. Engage with the vendor or community to obtain updates or patches as they become available. Finally, maintain regular backups and have an incident response plan ready to address potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-29T12:55:25.664Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692bb8adb00568eef0ca8d63
Added to database: 11/30/2025, 3:23:25 AM
Last enriched: 12/7/2025, 4:17:37 AM
Last updated: 1/14/2026, 7:34:21 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasannasp Short Link
MediumCVE-2026-0812: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in guillaumev LinkedIn SC
MediumCVE-2026-0741: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in electric-studio Electric Studio Download Counter
MediumCVE-2026-0739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webbu WMF Mobile Redirector
MediumCVE-2026-0734: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dfieldfl WP Allowed Hosts
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.