Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14780: SQL Injection in Xiongwei Smart Catering Cloud Platform

0
Medium
VulnerabilityCVE-2025-14780cvecve-2025-14780
Published: Tue Dec 16 2025 (12/16/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Xiongwei
Product: Smart Catering Cloud Platform

Description

CVE-2025-14780 is a medium-severity SQL injection vulnerability in Xiongwei Smart Catering Cloud Platform version 2. 1. 6446. 28761. The flaw exists in an unspecified function within the /dishtrade/dish_trade_detail_get endpoint, where manipulation of the 'filter' parameter allows remote attackers to inject SQL commands. Exploitation requires no user interaction but does require low-level privileges. Although no public exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of attacks. The vulnerability can lead to partial compromise of confidentiality, integrity, and availability of the affected system. European organizations using this platform, especially in countries with significant adoption of Xiongwei products or large catering/cloud service sectors, could be impacted. Mitigation involves applying vendor patches once available, implementing strict input validation, and monitoring database queries for anomalies.

AI-Powered Analysis

AILast updated: 12/23/2025, 14:43:46 UTC

Technical Analysis

CVE-2025-14780 is a SQL injection vulnerability identified in the Xiongwei Smart Catering Cloud Platform version 2.1.6446.28761. The vulnerability resides in an unspecified function within the /dishtrade/dish_trade_detail_get endpoint, where the 'filter' argument is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without user interaction, but requires low privileges on the system, indicating that an attacker must have some level of authenticated access or compromised credentials. The SQL injection could allow attackers to read, modify, or delete database contents, potentially leading to unauthorized data disclosure, data tampering, or disruption of service. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported, but public exploit code is available, increasing the risk of exploitation. The vulnerability affects a niche cloud platform used primarily in the catering industry, which may limit the scope but still poses a significant risk to organizations relying on this software for operational and transactional data processing.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive catering transaction data, customer information, and operational details stored in the affected platform's database. This could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and potential financial losses. Integrity violations could disrupt business operations by altering order or transaction records, leading to incorrect billing or inventory management. Availability impacts, while rated low, could still cause service interruptions if attackers exploit the vulnerability to execute destructive SQL commands. Organizations in Europe with deployments of Xiongwei Smart Catering Cloud Platform, especially those handling large volumes of customer data or integrated with other critical business systems, face increased risk. The medium severity rating suggests that while the vulnerability is not critical, it is exploitable and could be leveraged as part of a broader attack chain. The public availability of exploit code raises the likelihood of opportunistic attacks, particularly from threat actors targeting the hospitality and catering sectors.

Mitigation Recommendations

1. Monitor Xiongwei vendor channels closely for official patches or updates addressing CVE-2025-14780 and apply them promptly upon release. 2. Implement strict input validation and sanitization on all parameters, especially the 'filter' argument in the /dishtrade/dish_trade_detail_get endpoint, to prevent injection of malicious SQL code. 3. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this endpoint. 4. Restrict access to the affected endpoint and enforce the principle of least privilege, ensuring that only authorized users with necessary roles can access it. 5. Conduct regular security audits and code reviews focusing on input handling and database query construction. 6. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7. Educate internal teams about the risks of SQL injection and the importance of secure coding practices. 8. Consider network segmentation to isolate the catering platform from other critical infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-16T08:00:25.747Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69415d9883e5b48efc05b0b1

Added to database: 12/16/2025, 1:24:40 PM

Last enriched: 12/23/2025, 2:43:46 PM

Last updated: 2/7/2026, 10:05:44 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats