CVE-2025-14780: SQL Injection in Xiongwei Smart Catering Cloud Platform
A vulnerability was detected in Xiongwei Smart Catering Cloud Platform 2.1.6446.28761. The affected element is an unknown function of the file /dishtrade/dish_trade_detail_get. The manipulation of the argument filter results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-14780 identifies a SQL injection vulnerability in the Xiongwei Smart Catering Cloud Platform version 2.1.6446.28761. The vulnerability resides in an unspecified function accessed via the /dishtrade/dish_trade_detail_get endpoint, specifically through the 'filter' parameter. By manipulating this parameter, an attacker can inject arbitrary SQL commands into the backend database query. This injection flaw allows remote exploitation without requiring user interaction, though it necessitates low-level privileges on the platform. The vulnerability could enable attackers to read, modify, or delete sensitive data related to catering operations, potentially disrupting business processes or exposing confidential customer and transaction information. The CVSS 4.0 score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, combined with ease of exploitation and no user interaction needed. Although no exploits are currently observed in the wild, the public availability of exploit code increases the risk of future attacks. The lack of vendor patches at the time of reporting means organizations must rely on compensating controls until updates are released. Given the platform's role in managing catering trade details, exploitation could have operational and reputational consequences for affected businesses.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of catering-related data, including customer orders, transaction records, and operational details. Successful exploitation could lead to unauthorized data disclosure, data tampering, or denial of service conditions affecting catering services. This may result in financial losses, regulatory non-compliance (especially under GDPR for personal data exposure), and damage to brand reputation. The hospitality and catering sectors in Europe are significant economic contributors, and disruption could have cascading effects on supply chains and customer trust. Additionally, attackers could leverage the platform as a foothold for lateral movement within corporate networks. The medium severity suggests moderate urgency, but the public exploit availability necessitates prompt attention to prevent exploitation, particularly for organizations with internet-facing instances of the platform.
Mitigation Recommendations
1. Monitor vendor communications closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Implement strict input validation and sanitization on the 'filter' parameter and other user inputs to prevent SQL injection. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /dishtrade/dish_trade_detail_get endpoint. 4. Restrict access to the affected endpoint by IP whitelisting or VPN-only access to reduce exposure to external attackers. 5. Conduct regular security audits and penetration testing focused on injection vulnerabilities within the platform. 6. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7. Segment the network to isolate the catering platform from critical infrastructure to limit potential lateral movement. 8. Educate internal teams about the vulnerability and encourage prompt reporting of suspicious activity related to the platform.
Affected Countries
Germany, France, Italy, Spain, United Kingdom
CVE-2025-14780: SQL Injection in Xiongwei Smart Catering Cloud Platform
Description
A vulnerability was detected in Xiongwei Smart Catering Cloud Platform 2.1.6446.28761. The affected element is an unknown function of the file /dishtrade/dish_trade_detail_get. The manipulation of the argument filter results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14780 identifies a SQL injection vulnerability in the Xiongwei Smart Catering Cloud Platform version 2.1.6446.28761. The vulnerability resides in an unspecified function accessed via the /dishtrade/dish_trade_detail_get endpoint, specifically through the 'filter' parameter. By manipulating this parameter, an attacker can inject arbitrary SQL commands into the backend database query. This injection flaw allows remote exploitation without requiring user interaction, though it necessitates low-level privileges on the platform. The vulnerability could enable attackers to read, modify, or delete sensitive data related to catering operations, potentially disrupting business processes or exposing confidential customer and transaction information. The CVSS 4.0 score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, combined with ease of exploitation and no user interaction needed. Although no exploits are currently observed in the wild, the public availability of exploit code increases the risk of future attacks. The lack of vendor patches at the time of reporting means organizations must rely on compensating controls until updates are released. Given the platform's role in managing catering trade details, exploitation could have operational and reputational consequences for affected businesses.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of catering-related data, including customer orders, transaction records, and operational details. Successful exploitation could lead to unauthorized data disclosure, data tampering, or denial of service conditions affecting catering services. This may result in financial losses, regulatory non-compliance (especially under GDPR for personal data exposure), and damage to brand reputation. The hospitality and catering sectors in Europe are significant economic contributors, and disruption could have cascading effects on supply chains and customer trust. Additionally, attackers could leverage the platform as a foothold for lateral movement within corporate networks. The medium severity suggests moderate urgency, but the public exploit availability necessitates prompt attention to prevent exploitation, particularly for organizations with internet-facing instances of the platform.
Mitigation Recommendations
1. Monitor vendor communications closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. Implement strict input validation and sanitization on the 'filter' parameter and other user inputs to prevent SQL injection. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /dishtrade/dish_trade_detail_get endpoint. 4. Restrict access to the affected endpoint by IP whitelisting or VPN-only access to reduce exposure to external attackers. 5. Conduct regular security audits and penetration testing focused on injection vulnerabilities within the platform. 6. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7. Segment the network to isolate the catering platform from critical infrastructure to limit potential lateral movement. 8. Educate internal teams about the vulnerability and encourage prompt reporting of suspicious activity related to the platform.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-16T08:00:25.747Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69415d9883e5b48efc05b0b1
Added to database: 12/16/2025, 1:24:40 PM
Last enriched: 12/16/2025, 1:28:24 PM
Last updated: 12/16/2025, 4:05:42 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68269: CWE-349 in JetBrains IntelliJ IDEA
MediumCVE-2025-68268: CWE-79 in JetBrains TeamCity
MediumCVE-2025-68267: CWE-272 in JetBrains TeamCity
MediumCVE-2025-68166: CWE-79 in JetBrains TeamCity
MediumCVE-2025-68165: CWE-79 in JetBrains TeamCity
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.