CVE-2025-14011: SQL Injection in JIZHICMS
A vulnerability was found in JIZHICMS up to 2.5.5. Impacted is the function commentlist of the file /index.php/admins/Comment/addcomment.html of the component Add Display Name Field. Performing manipulation of the argument aid/tid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14011 is a SQL injection vulnerability identified in JIZHICMS, a content management system, affecting versions 2.5.0 through 2.5.5. The vulnerability resides in the commentlist function of the file /index.php/admins/Comment/addcomment.html, specifically in the Add Display Name Field component. The parameters aid and tid are improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. The impact includes potential unauthorized data access, data modification, or disruption of service. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description states remote exploitation without authentication, suggesting some ambiguity), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability. The vendor has not issued a patch or responded to disclosure, and no known exploits are currently in the wild, though a public exploit exists. This vulnerability poses a moderate risk, especially for organizations relying on JIZHICMS for web content management without additional protective controls.
Potential Impact
For European organizations, exploitation of CVE-2025-14011 could lead to unauthorized access to sensitive data stored in the CMS database, including user comments and potentially other administrative data. Data integrity could be compromised by unauthorized modification or deletion of records, impacting the reliability of published content. Availability may also be affected if attackers leverage the injection to cause database errors or denial of service. Organizations in sectors such as government, education, and media that use JIZHICMS for public-facing websites could face reputational damage and regulatory scrutiny under GDPR if personal data is exposed. The lack of vendor response and patch increases the risk exposure window. Attackers could leverage this vulnerability as an initial foothold for further network intrusion or lateral movement within affected organizations. The moderate CVSS score reflects the potential for impactful but not catastrophic compromise, emphasizing the need for timely mitigation.
Mitigation Recommendations
1. Immediately restrict access to the /index.php/admins/Comment/addcomment.html endpoint using network-level controls such as IP whitelisting or VPN-only access to limit exposure. 2. Deploy a Web Application Firewall (WAF) with updated SQL injection detection rules to block malicious payloads targeting the aid and tid parameters. 3. Conduct thorough input validation and sanitization on all parameters, especially aid and tid, to prevent injection attacks. 4. Monitor database logs and web server logs for unusual query patterns or repeated failed attempts indicative of exploitation attempts. 5. If possible, upgrade to a non-vulnerable version of JIZHICMS once available or apply community-developed patches or workarounds. 6. Implement strict least-privilege database user permissions to limit the impact of any successful injection. 7. Educate administrators and developers about secure coding practices and the importance of timely patching. 8. Consider isolating the CMS environment to minimize lateral movement risk if compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14011: SQL Injection in JIZHICMS
Description
A vulnerability was found in JIZHICMS up to 2.5.5. Impacted is the function commentlist of the file /index.php/admins/Comment/addcomment.html of the component Add Display Name Field. Performing manipulation of the argument aid/tid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14011 is a SQL injection vulnerability identified in JIZHICMS, a content management system, affecting versions 2.5.0 through 2.5.5. The vulnerability resides in the commentlist function of the file /index.php/admins/Comment/addcomment.html, specifically in the Add Display Name Field component. The parameters aid and tid are improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, enabling attackers to manipulate backend database queries. The impact includes potential unauthorized data access, data modification, or disruption of service. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description states remote exploitation without authentication, suggesting some ambiguity), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability. The vendor has not issued a patch or responded to disclosure, and no known exploits are currently in the wild, though a public exploit exists. This vulnerability poses a moderate risk, especially for organizations relying on JIZHICMS for web content management without additional protective controls.
Potential Impact
For European organizations, exploitation of CVE-2025-14011 could lead to unauthorized access to sensitive data stored in the CMS database, including user comments and potentially other administrative data. Data integrity could be compromised by unauthorized modification or deletion of records, impacting the reliability of published content. Availability may also be affected if attackers leverage the injection to cause database errors or denial of service. Organizations in sectors such as government, education, and media that use JIZHICMS for public-facing websites could face reputational damage and regulatory scrutiny under GDPR if personal data is exposed. The lack of vendor response and patch increases the risk exposure window. Attackers could leverage this vulnerability as an initial foothold for further network intrusion or lateral movement within affected organizations. The moderate CVSS score reflects the potential for impactful but not catastrophic compromise, emphasizing the need for timely mitigation.
Mitigation Recommendations
1. Immediately restrict access to the /index.php/admins/Comment/addcomment.html endpoint using network-level controls such as IP whitelisting or VPN-only access to limit exposure. 2. Deploy a Web Application Firewall (WAF) with updated SQL injection detection rules to block malicious payloads targeting the aid and tid parameters. 3. Conduct thorough input validation and sanitization on all parameters, especially aid and tid, to prevent injection attacks. 4. Monitor database logs and web server logs for unusual query patterns or repeated failed attempts indicative of exploitation attempts. 5. If possible, upgrade to a non-vulnerable version of JIZHICMS once available or apply community-developed patches or workarounds. 6. Implement strict least-privilege database user permissions to limit the impact of any successful injection. 7. Educate administrators and developers about secure coding practices and the importance of timely patching. 8. Consider isolating the CMS environment to minimize lateral movement risk if compromised.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-04T11:27:03.301Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6931c7b5911f2f20c4ae9811
Added to database: 12/4/2025, 5:41:09 PM
Last enriched: 12/11/2025, 9:46:03 PM
Last updated: 1/19/2026, 12:19:41 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit
MediumCVE-2025-15539: Denial of Service in Open5GS
MediumCVE-2026-23733: CWE-94: Improper Control of Generation of Code ('Code Injection') in lobehub lobe-chat
MediumCVE-2025-15538: Use After Free in Open Asset Import Library Assimp
MediumCVE-2026-23644: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in esm-dev esm.sh
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.