Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14780: SQL Injection in Xiongwei Smart Catering Cloud Platform

0
Medium
VulnerabilityCVE-2025-14780cvecve-2025-14780
Published: Tue Dec 16 2025 (12/16/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Xiongwei
Product: Smart Catering Cloud Platform

Description

A vulnerability was detected in Xiongwei Smart Catering Cloud Platform 2.1.6446.28761. The affected element is an unknown function of the file /dishtrade/dish_trade_detail_get. The manipulation of the argument filter results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 12/16/2025, 13:28:24 UTC

Technical Analysis

CVE-2025-14780 identifies a SQL injection vulnerability in the Xiongwei Smart Catering Cloud Platform version 2.1.6446.28761. The vulnerability resides in an unspecified function accessed via the /dishtrade/dish_trade_detail_get endpoint, specifically through the 'filter' parameter. By manipulating this parameter, an attacker can inject arbitrary SQL commands into the backend database query. This injection flaw allows remote exploitation without requiring user interaction, though it necessitates low-level privileges on the platform. The vulnerability could enable attackers to read, modify, or delete sensitive data related to catering operations, potentially disrupting business processes or exposing confidential customer and transaction information. The CVSS 4.0 score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, combined with ease of exploitation and no user interaction needed. Although no exploits are currently observed in the wild, the public availability of exploit code increases the risk of future attacks. The lack of vendor patches at the time of reporting means organizations must rely on compensating controls until updates are released. Given the platform's role in managing catering trade details, exploitation could have operational and reputational consequences for affected businesses.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of catering-related data, including customer orders, transaction records, and operational details. Successful exploitation could lead to unauthorized data disclosure, data tampering, or denial of service conditions affecting catering services. This may result in financial losses, regulatory non-compliance (especially under GDPR for personal data exposure), and damage to brand reputation. The hospitality and catering sectors in Europe are significant economic contributors, and disruption could have cascading effects on supply chains and customer trust. Additionally, attackers could leverage the platform as a foothold for lateral movement within corporate networks. The medium severity suggests moderate urgency, but the public exploit availability necessitates prompt attention to prevent exploitation, particularly for organizations with internet-facing instances of the platform.

Mitigation Recommendations

1. Monitor vendor communications closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Implement strict input validation and sanitization on the 'filter' parameter and other user inputs to prevent SQL injection. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /dishtrade/dish_trade_detail_get endpoint. 4. Restrict access to the affected endpoint by IP whitelisting or VPN-only access to reduce exposure to external attackers. 5. Conduct regular security audits and penetration testing focused on injection vulnerabilities within the platform. 6. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7. Segment the network to isolate the catering platform from critical infrastructure to limit potential lateral movement. 8. Educate internal teams about the vulnerability and encourage prompt reporting of suspicious activity related to the platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-16T08:00:25.747Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69415d9883e5b48efc05b0b1

Added to database: 12/16/2025, 1:24:40 PM

Last enriched: 12/16/2025, 1:28:24 PM

Last updated: 12/16/2025, 4:05:42 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats