Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13811: SQL Injection in jsnjfz WebStack-Guns

0
Medium
VulnerabilityCVE-2025-13811cvecve-2025-13811
Published: Mon Dec 01 2025 (12/01/2025, 06:32:05 UTC)
Source: CVE Database V5
Vendor/Project: jsnjfz
Product: WebStack-Guns

Description

A vulnerability was determined in jsnjfz WebStack-Guns 1.0. This vulnerability affects unknown code of the file src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java. Executing a manipulation of the argument sort can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:13:01 UTC

Technical Analysis

CVE-2025-13811 identifies a SQL injection vulnerability in the jsnjfz WebStack-Guns 1.0 product, specifically within the source file src/main/java/com/jsnjfz/manage/core/common/constant/factory/PageFactory.java. The vulnerability arises from improper handling of the 'sort' parameter, which is used in SQL queries without adequate sanitization or parameterization. This flaw allows an attacker to craft malicious input that alters the intended SQL command, potentially enabling unauthorized data retrieval, modification, or deletion. The attack vector is remote network access, and exploitation requires low privileges but no user interaction, increasing the risk of automated attacks. The vendor was informed early but has not responded or released a patch, while exploit details have been publicly disclosed, raising the urgency for defensive measures. The CVSS 4.0 score is 5.3 (medium), reflecting the moderate impact and ease of exploitation. The vulnerability affects only version 1.0 of WebStack-Guns, a web application framework or platform, which may be used in various organizational environments. Lack of vendor response and public exploit availability heighten the threat landscape, necessitating immediate mitigation.

Potential Impact

The SQL injection vulnerability in WebStack-Guns 1.0 can lead to unauthorized access to sensitive data, data corruption, or deletion, compromising confidentiality, integrity, and availability of affected systems. Attackers could extract database contents, manipulate records, or disrupt application functionality. Since the exploit can be launched remotely without user interaction and requires only low privileges, automated attacks and worm-like propagation are possible. Organizations relying on this software for web applications may face data breaches, service outages, and reputational damage. The absence of a vendor patch increases exposure duration, potentially inviting targeted attacks or inclusion in exploit kits. The medium CVSS score reflects moderate impact, but real-world consequences depend on the data sensitivity and deployment context. Critical business functions relying on WebStack-Guns could be disrupted, and compliance violations may occur if sensitive data is exposed.

Mitigation Recommendations

Organizations should immediately implement strict input validation and sanitization for all parameters, especially the 'sort' argument, to prevent injection of malicious SQL code. Employ prepared statements or parameterized queries in the affected codebase to eliminate direct concatenation of user input into SQL commands. If source code access is available, refactor the PageFactory.java file to enforce these secure coding practices. In the absence of an official patch, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'sort' parameter. Monitor logs for unusual query patterns or repeated failed attempts indicative of exploitation attempts. Restrict database user privileges to the minimum necessary to limit potential damage. Engage in threat hunting to identify any signs of compromise. Plan for migration to a patched or alternative solution once available. Coordinate with internal security teams to raise awareness and prepare incident response plans specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T17:05:06.347Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692d3b0e0729cca2073502d8

Added to database: 12/1/2025, 6:51:58 AM

Last enriched: 2/24/2026, 10:13:01 PM

Last updated: 3/24/2026, 1:59:08 PM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses