CVE-2025-14190: SQL Injection in Chanjet TPlus
A flaw has been found in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument currentAccId causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14190 identifies a SQL injection vulnerability in Chanjet TPlus, a business management software product, specifically in version 20251121 and earlier. The flaw is located in an unknown functionality accessed through the HTTP endpoint /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx with the query parameter method=Load. The vulnerability stems from improper input validation and sanitization of the currentAccId parameter, which is directly incorporated into SQL queries. This allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the database to retrieve, modify, or delete sensitive information. The attack vector requires no user interaction and can be initiated over the network, increasing the risk of automated exploitation. Although no confirmed exploits are currently active in the wild, proof-of-concept exploits have been published, raising the likelihood of future attacks. The vendor has been contacted but has not issued any response or patch, leaving systems exposed. The CVSS 4.0 base score is 6.9, reflecting a medium severity level due to the network attack vector, lack of required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability affects the confidentiality, integrity, and availability of data to a limited extent, as indicated by the CVSS vector. Organizations using Chanjet TPlus should be aware of this risk and implement compensating controls until an official patch is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, particularly for those using Chanjet TPlus in finance, accounting, or enterprise resource planning functions. Successful exploitation could lead to unauthorized disclosure of sensitive financial data, unauthorized modification of records, or disruption of business operations. This could result in regulatory compliance violations under GDPR due to data breaches, financial losses, reputational damage, and operational downtime. The lack of vendor response and absence of patches increase the exposure window. Organizations with interconnected systems or those relying heavily on Chanjet TPlus for critical business processes are at higher risk. Attackers could leverage this vulnerability to gain footholds in corporate networks or exfiltrate data. The remote, unauthenticated nature of the exploit makes it accessible to a wide range of threat actors, including opportunistic attackers and advanced persistent threats targeting European enterprises.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the vulnerable endpoint by using firewalls or web application firewalls (WAFs) to block or filter suspicious requests targeting the currentAccId parameter. 2) Employing input validation and sanitization proxies or reverse proxies that can detect and block SQL injection patterns. 3) Monitoring logs for unusual or malformed requests to the affected endpoint to detect potential exploitation attempts. 4) Conducting internal code reviews or penetration testing to identify and mitigate similar injection flaws in customizations or integrations. 5) Isolating the Chanjet TPlus system within segmented network zones to limit lateral movement if compromised. 6) Preparing incident response plans specific to SQL injection attacks and ensuring backups are current and tested. 7) Engaging with Chanjet support channels persistently to obtain updates or patches. 8) Considering temporary migration to alternative software solutions if feasible, until the vulnerability is remediated. These measures should be combined to reduce the attack surface and detect exploitation attempts proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14190: SQL Injection in Chanjet TPlus
Description
A flaw has been found in Chanjet TPlus up to 20251121. Affected by this vulnerability is an unknown functionality of the file /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx?method=Load. This manipulation of the argument currentAccId causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14190 identifies a SQL injection vulnerability in Chanjet TPlus, a business management software product, specifically in version 20251121 and earlier. The flaw is located in an unknown functionality accessed through the HTTP endpoint /tplus/ajaxpro/Ufida.T.SM.UIP.MultiCompanySettingController,Ufida.T.SM.UIP.ashx with the query parameter method=Load. The vulnerability stems from improper input validation and sanitization of the currentAccId parameter, which is directly incorporated into SQL queries. This allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the database to retrieve, modify, or delete sensitive information. The attack vector requires no user interaction and can be initiated over the network, increasing the risk of automated exploitation. Although no confirmed exploits are currently active in the wild, proof-of-concept exploits have been published, raising the likelihood of future attacks. The vendor has been contacted but has not issued any response or patch, leaving systems exposed. The CVSS 4.0 base score is 6.9, reflecting a medium severity level due to the network attack vector, lack of required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. The vulnerability affects the confidentiality, integrity, and availability of data to a limited extent, as indicated by the CVSS vector. Organizations using Chanjet TPlus should be aware of this risk and implement compensating controls until an official patch is released.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, particularly for those using Chanjet TPlus in finance, accounting, or enterprise resource planning functions. Successful exploitation could lead to unauthorized disclosure of sensitive financial data, unauthorized modification of records, or disruption of business operations. This could result in regulatory compliance violations under GDPR due to data breaches, financial losses, reputational damage, and operational downtime. The lack of vendor response and absence of patches increase the exposure window. Organizations with interconnected systems or those relying heavily on Chanjet TPlus for critical business processes are at higher risk. Attackers could leverage this vulnerability to gain footholds in corporate networks or exfiltrate data. The remote, unauthenticated nature of the exploit makes it accessible to a wide range of threat actors, including opportunistic attackers and advanced persistent threats targeting European enterprises.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the vulnerable endpoint by using firewalls or web application firewalls (WAFs) to block or filter suspicious requests targeting the currentAccId parameter. 2) Employing input validation and sanitization proxies or reverse proxies that can detect and block SQL injection patterns. 3) Monitoring logs for unusual or malformed requests to the affected endpoint to detect potential exploitation attempts. 4) Conducting internal code reviews or penetration testing to identify and mitigate similar injection flaws in customizations or integrations. 5) Isolating the Chanjet TPlus system within segmented network zones to limit lateral movement if compromised. 6) Preparing incident response plans specific to SQL injection attacks and ensuring backups are current and tested. 7) Engaging with Chanjet support channels persistently to obtain updates or patches. 8) Considering temporary migration to alternative software solutions if feasible, until the vulnerability is remediated. These measures should be combined to reduce the attack surface and detect exploitation attempts proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T14:25:57.712Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693572f137e7cb8c9bebccb9
Added to database: 12/7/2025, 12:28:33 PM
Last enriched: 12/14/2025, 1:35:15 PM
Last updated: 2/7/2026, 3:03:07 AM
Views: 113
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.