Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14190: SQL Injection in Chanjet TPlus

0
Medium
VulnerabilityCVE-2025-14190cvecve-2025-14190
Published: Sun Dec 07 2025 (12/07/2025, 12:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Chanjet
Product: TPlus

Description

A flaw has been found in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument currentAccId causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 12:30:47 UTC

Technical Analysis

CVE-2025-14190 is a SQL injection vulnerability identified in the Chanjet TPlus enterprise software suite, specifically affecting versions up to 20251121. The vulnerability resides in an unknown functionality within the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx, where the currentAccId parameter is improperly sanitized. This improper input validation allows an attacker to inject arbitrary SQL commands remotely without requiring authentication or user interaction. The attack vector is network accessible (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:N, UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). Although the vendor has been notified, no patch or official response has been issued, and a public exploit is available, increasing the risk of exploitation. The vulnerability could allow attackers to extract sensitive business data, modify database contents, or disrupt service operations. The lack of authentication requirement and remote exploitability make this a significant concern for organizations relying on Chanjet TPlus for financial or operational management. The CVSS 4.0 score of 6.9 reflects a medium severity rating, balancing the ease of exploitation with the limited scope of impact. No known exploits are currently active in the wild, but the public availability of exploit code necessitates proactive defense measures.

Potential Impact

For European organizations, the exploitation of CVE-2025-14190 could lead to unauthorized disclosure of sensitive financial and operational data managed within Chanjet TPlus. This may result in data breaches, loss of intellectual property, and regulatory non-compliance, particularly under GDPR requirements. Integrity of financial records could be compromised, affecting business decision-making and reporting accuracy. Availability impacts, while limited, could disrupt critical business processes relying on TPlus. Organizations in finance, manufacturing, and supply chain sectors using Chanjet TPlus are especially vulnerable. The absence of vendor patches increases exposure duration, raising the likelihood of targeted attacks. Additionally, the public exploit availability lowers the barrier for threat actors, including cybercriminals and state-sponsored groups, to conduct attacks. The reputational damage and potential financial losses from such breaches could be significant, especially for companies with cross-border operations within Europe. The medium severity rating suggests that while the threat is serious, it may not lead to full system compromise without additional vulnerabilities or misconfigurations.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement immediate compensating controls. First, restrict access to the vulnerable endpoint by applying network-level controls such as IP whitelisting or VPN-only access to the Chanjet TPlus application. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the currentAccId parameter. Conduct thorough input validation and sanitization on all user-supplied data, if customization or middleware controls are possible. Monitor application and database logs for unusual queries or error messages indicative of injection attempts. Employ database activity monitoring tools to detect anomalous SQL commands. Segregate the TPlus environment from other critical systems to limit lateral movement in case of compromise. Educate IT and security teams about the vulnerability and the importance of rapid incident response. Prepare for incident handling by establishing procedures to isolate affected systems and conduct forensic analysis. Finally, maintain regular backups of critical data to enable recovery if data integrity is compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T14:25:57.712Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693572f137e7cb8c9bebccb9

Added to database: 12/7/2025, 12:28:33 PM

Last enriched: 12/7/2025, 12:30:47 PM

Last updated: 12/8/2025, 12:52:09 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats