Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14966: SQL Injection in FastAdmin

0
Medium
VulnerabilityCVE-2025-14966cvecve-2025-14966
Published: Fri Dec 19 2025 (12/19/2025, 19:32:08 UTC)
Source: CVE Database V5
Product: FastAdmin

Description

A vulnerability was determined in FastAdmin up to 1.7.0.20250506. Affected is the function selectpage of the file application/common/controller/Backend.php of the component Backend Controller. Executing manipulation of the argument custom/searchField can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 12/19/2025, 19:55:08 UTC

Technical Analysis

CVE-2025-14966 identifies an SQL injection vulnerability in the FastAdmin framework, specifically affecting the selectpage function within the Backend Controller component (application/common/controller/Backend.php). The vulnerability arises from improper sanitization of the custom/searchField parameter, which attackers can manipulate to inject malicious SQL queries. This flaw allows remote exploitation without requiring user interaction or authentication, enabling attackers to execute arbitrary SQL commands on the backend database. Potential consequences include unauthorized data access, data modification, or deletion, and possible disruption of service availability. The vulnerability affects FastAdmin versions up to 1.7.0.20250506. Although the CVSS 4.0 base score is 5.1 (medium severity), reflecting limited scope and impact on confidentiality, integrity, and availability, the exploitability is high due to low attack complexity and no user interaction needed. No known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. The vulnerability is critical for organizations relying on FastAdmin for backend management, especially those handling sensitive or regulated data. The lack of available patches at the time of disclosure necessitates immediate mitigation through input validation and access controls until official fixes are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of data managed via FastAdmin-based backend systems. Exploitation could lead to unauthorized data disclosure, modification, or deletion, potentially impacting customer data, intellectual property, or operational data. This could result in regulatory non-compliance, especially under GDPR, leading to legal and financial penalties. Service disruption caused by database manipulation could affect business continuity and damage organizational reputation. Given the remote exploitability without authentication, attackers can target exposed FastAdmin instances over the internet, increasing the attack surface. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that utilize FastAdmin are particularly vulnerable. The medium severity score suggests moderate impact, but the ease of exploitation and potential data sensitivity elevate the threat level. The absence of known exploits currently provides a window for proactive defense, but the public disclosure increases the urgency for mitigation.

Mitigation Recommendations

1. Monitor FastAdmin vendor communications closely and apply official patches immediately upon release. 2. Implement strict input validation and sanitization on the custom/searchField parameter to prevent injection of malicious SQL code. 3. Restrict access to the Backend Controller endpoints by IP whitelisting or VPN to limit exposure to trusted users only. 4. Employ Web Application Firewalls (WAF) with rules designed to detect and block SQL injection attempts targeting FastAdmin. 5. Conduct regular security assessments and penetration testing focusing on backend interfaces to identify similar injection flaws. 6. Review and harden database permissions to minimize the impact of potential SQL injection exploitation. 7. Enable detailed logging and monitoring of backend access and query anomalies to detect exploitation attempts early. 8. Educate development and operations teams about secure coding practices and the risks of unsanitized input parameters. 9. Consider isolating FastAdmin backend services in segmented network zones to reduce lateral movement risk. 10. Prepare incident response plans specific to SQL injection attacks to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-19T10:46:01.207Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945aa0f94037f6b535451d0

Added to database: 12/19/2025, 7:39:59 PM

Last enriched: 12/19/2025, 7:55:08 PM

Last updated: 12/19/2025, 8:40:43 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats