Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14190: SQL Injection in Chanjet TPlus

0
Medium
VulnerabilityCVE-2025-14190cvecve-2025-14190
Published: Sun Dec 07 2025 (12/07/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Chanjet
Product: TPlus

Description

A flaw has been found in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument currentAccId causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/14/2025, 13:35:15 UTC

Technical Analysis

CVE-2025-14190 identifies a SQL injection vulnerability in Chanjet TPlus, a business management software product, specifically in version 20251121 and earlier. The flaw is located in an unknown functionality accessed through the HTTP endpoint /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx with the query parameter method=Load. The vulnerability stems from improper input validation and sanitization of the currentAccId parameter, which is directly incorporated into SQL queries. This allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the database to retrieve, modify, or delete sensitive information. The attack vector requires no user interaction and can be initiated over the network, increasing the risk of automated exploitation. Although no confirmed exploits are currently active in the wild, proof-of-concept exploits have been published, raising the likelihood of future attacks. The vendor has been contacted but has not issued any response or patch, leaving systems exposed. The CVSS 4.0 base score is 6.9, reflecting a medium severity level due to the network attack vector, lack of required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability affects the confidentiality, integrity, and availability of data to a limited extent, as indicated by the CVSS vector. Organizations using Chanjet TPlus should be aware of this risk and implement compensating controls until an official patch is released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, particularly for those using Chanjet TPlus in finance, accounting, or enterprise resource planning functions. Successful exploitation could lead to unauthorized disclosure of sensitive financial data, unauthorized modification of records, or disruption of business operations. This could result in regulatory compliance violations under GDPR due to data breaches, financial losses, reputational damage, and operational downtime. The lack of vendor response and absence of patches increase the exposure window. Organizations with interconnected systems or those relying heavily on Chanjet TPlus for critical business processes are at higher risk. Attackers could leverage this vulnerability to gain footholds in corporate networks or exfiltrate data. The remote, unauthenticated nature of the exploit makes it accessible to a wide range of threat actors, including opportunistic attackers and advanced persistent threats targeting European enterprises.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the vulnerable endpoint by using firewalls or web application firewalls (WAFs) to block or filter suspicious requests targeting the currentAccId parameter. 2) Employing input validation and sanitization proxies or reverse proxies that can detect and block SQL injection patterns. 3) Monitoring logs for unusual or malformed requests to the affected endpoint to detect potential exploitation attempts. 4) Conducting internal code reviews or penetration testing to identify and mitigate similar injection flaws in customizations or integrations. 5) Isolating the Chanjet TPlus system within segmented network zones to limit lateral movement if compromised. 6) Preparing incident response plans specific to SQL injection attacks and ensuring backups are current and tested. 7) Engaging with Chanjet support channels persistently to obtain updates or patches. 8) Considering temporary migration to alternative software solutions if feasible, until the vulnerability is remediated. These measures should be combined to reduce the attack surface and detect exploitation attempts proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T14:25:57.712Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693572f137e7cb8c9bebccb9

Added to database: 12/7/2025, 12:28:33 PM

Last enriched: 12/14/2025, 1:35:15 PM

Last updated: 2/7/2026, 3:03:07 AM

Views: 113

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats