CVE-2025-13811: SQL Injection in jsnjfz WebStack-Guns
A vulnerability was determined in jsnjfz WebStack-Guns 1.0. This vulnerability affects unknown code of the file src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java. Executing manipulation of the argument sort can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13811 affects jsnjfz WebStack-Guns version 1.0, specifically in the source code file src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java. The flaw is an SQL injection caused by improper sanitization or validation of the 'sort' parameter, which is used in constructing SQL queries. An attacker can remotely send crafted input to this parameter, leading to injection of arbitrary SQL commands. This can result in unauthorized data access, modification, or potentially data destruction depending on the database privileges. The vulnerability does not require authentication or user interaction, increasing its risk profile. The vendor was informed early but has not issued a patch or mitigation guidance. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges needed), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploitability is partially confirmed (E:P), but no active exploitation has been reported. The lack of vendor response and public disclosure increases the urgency for users to apply their own mitigations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if they deploy jsnjfz WebStack-Guns 1.0 in their web infrastructure. Successful exploitation could lead to unauthorized access to sensitive data stored in backend databases, including customer information, internal records, or intellectual property. Data integrity could be compromised by unauthorized modifications, and availability might be affected if attackers execute destructive queries. Given the remote exploitability without authentication, attackers can operate from anywhere, increasing the threat surface. Organizations in sectors with strict data protection regulations such as GDPR could face compliance violations and reputational damage if breaches occur. The medium severity score reflects that while the impact is not catastrophic, it is still serious enough to warrant prompt attention, especially in environments where the software is exposed to the internet.
Mitigation Recommendations
Since no official patch or vendor guidance is available, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the 'sort' parameter at the application or web server level to block malicious payloads. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this parameter. Restrict database user permissions to the minimum necessary to limit the impact of any injection. Monitor logs for unusual query patterns or errors indicative of injection attempts. If possible, isolate or segment systems running WebStack-Guns to reduce exposure. Consider replacing or upgrading the software if feasible. Additionally, conduct security audits and penetration testing focused on SQL injection vectors. Maintain heightened monitoring for any signs of exploitation and prepare incident response plans accordingly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-13811: SQL Injection in jsnjfz WebStack-Guns
Description
A vulnerability was determined in jsnjfz WebStack-Guns 1.0. This vulnerability affects unknown code of the file src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java. Executing manipulation of the argument sort can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13811 affects jsnjfz WebStack-Guns version 1.0, specifically in the source code file src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java. The flaw is an SQL injection caused by improper sanitization or validation of the 'sort' parameter, which is used in constructing SQL queries. An attacker can remotely send crafted input to this parameter, leading to injection of arbitrary SQL commands. This can result in unauthorized data access, modification, or potentially data destruction depending on the database privileges. The vulnerability does not require authentication or user interaction, increasing its risk profile. The vendor was informed early but has not issued a patch or mitigation guidance. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges needed), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploitability is partially confirmed (E:P), but no active exploitation has been reported. The lack of vendor response and public disclosure increases the urgency for users to apply their own mitigations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if they deploy jsnjfz WebStack-Guns 1.0 in their web infrastructure. Successful exploitation could lead to unauthorized access to sensitive data stored in backend databases, including customer information, internal records, or intellectual property. Data integrity could be compromised by unauthorized modifications, and availability might be affected if attackers execute destructive queries. Given the remote exploitability without authentication, attackers can operate from anywhere, increasing the threat surface. Organizations in sectors with strict data protection regulations such as GDPR could face compliance violations and reputational damage if breaches occur. The medium severity score reflects that while the impact is not catastrophic, it is still serious enough to warrant prompt attention, especially in environments where the software is exposed to the internet.
Mitigation Recommendations
Since no official patch or vendor guidance is available, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the 'sort' parameter at the application or web server level to block malicious payloads. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this parameter. Restrict database user permissions to the minimum necessary to limit the impact of any injection. Monitor logs for unusual query patterns or errors indicative of injection attempts. If possible, isolate or segment systems running WebStack-Guns to reduce exposure. Consider replacing or upgrading the software if feasible. Additionally, conduct security audits and penetration testing focused on SQL injection vectors. Maintain heightened monitoring for any signs of exploitation and prepare incident response plans accordingly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T17:05:06.347Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692d3b0e0729cca2073502d8
Added to database: 12/1/2025, 6:51:58 AM
Last enriched: 12/8/2025, 7:39:07 AM
Last updated: 1/19/2026, 7:34:22 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighCVE-2026-1139: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.