CVE-2025-14966: SQL Injection in FastAdmin
A vulnerability was determined in FastAdmin up to 1.7.0.20250506. Affected is the function selectpage of the file application/common/controller/Backend.php of the component Backend Controller. Executing a manipulation of the argument custom/searchField can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-14966 identifies a SQL injection vulnerability in FastAdmin, an open-source rapid development framework for backend management systems. The flaw exists in the selectpage function within the Backend Controller component (application/common/controller/Backend.php). Specifically, the vulnerability stems from insufficient input validation and sanitization of the custom/searchField parameter, which is used directly in SQL queries. An attacker with high privileges can remotely manipulate this parameter to inject malicious SQL code, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability does not require user interaction but does require authentication with elevated privileges, limiting the attack surface somewhat. The CVSS 4.0 base score is 5.1 (medium), reflecting the moderate impact and exploitation complexity. No patches or fixes have been explicitly linked yet, and no active exploits have been reported, but the public disclosure increases the urgency for remediation. The vulnerability affects FastAdmin version 1.7.0.20250506 and earlier. Given FastAdmin's use in web applications, exploitation could compromise backend databases, leading to data breaches or service disruptions.
Potential Impact
The SQL injection vulnerability can lead to unauthorized access to sensitive backend data, data corruption, or deletion, impacting confidentiality, integrity, and availability of organizational data. Attackers with high privileges could leverage this flaw to escalate their access or manipulate database contents, potentially affecting business operations and customer trust. The ability to execute arbitrary SQL commands remotely increases the risk of large-scale data breaches or service outages. Organizations relying on FastAdmin for critical backend management systems may face operational disruptions, regulatory compliance issues, and reputational damage. The medium CVSS score indicates moderate ease of exploitation but significant potential impact if exploited. The lack of known active exploits currently reduces immediate risk but does not eliminate it, especially given the public disclosure.
Mitigation Recommendations
1. Apply official patches or updates from FastAdmin as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict access to the Backend Controller's selectpage function to trusted administrators only, using network segmentation and access control lists. 3. Implement rigorous input validation and sanitization on the custom/searchField parameter to prevent malicious SQL code injection. 4. Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection attempts targeting this parameter. 5. Conduct regular security audits and code reviews focusing on input handling in backend controllers. 6. Monitor logs for unusual database queries or failed authentication attempts indicative of exploitation attempts. 7. Educate developers and administrators about the risks of SQL injection and secure coding practices to prevent similar vulnerabilities. 8. Consider deploying database activity monitoring tools to detect anomalous SQL commands in real time.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Brazil, Russia, Japan, South Korea
CVE-2025-14966: SQL Injection in FastAdmin
Description
A vulnerability was determined in FastAdmin up to 1.7.0.20250506. Affected is the function selectpage of the file application/common/controller/Backend.php of the component Backend Controller. Executing a manipulation of the argument custom/searchField can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14966 identifies a SQL injection vulnerability in FastAdmin, an open-source rapid development framework for backend management systems. The flaw exists in the selectpage function within the Backend Controller component (application/common/controller/Backend.php). Specifically, the vulnerability stems from insufficient input validation and sanitization of the custom/searchField parameter, which is used directly in SQL queries. An attacker with high privileges can remotely manipulate this parameter to inject malicious SQL code, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability does not require user interaction but does require authentication with elevated privileges, limiting the attack surface somewhat. The CVSS 4.0 base score is 5.1 (medium), reflecting the moderate impact and exploitation complexity. No patches or fixes have been explicitly linked yet, and no active exploits have been reported, but the public disclosure increases the urgency for remediation. The vulnerability affects FastAdmin version 1.7.0.20250506 and earlier. Given FastAdmin's use in web applications, exploitation could compromise backend databases, leading to data breaches or service disruptions.
Potential Impact
The SQL injection vulnerability can lead to unauthorized access to sensitive backend data, data corruption, or deletion, impacting confidentiality, integrity, and availability of organizational data. Attackers with high privileges could leverage this flaw to escalate their access or manipulate database contents, potentially affecting business operations and customer trust. The ability to execute arbitrary SQL commands remotely increases the risk of large-scale data breaches or service outages. Organizations relying on FastAdmin for critical backend management systems may face operational disruptions, regulatory compliance issues, and reputational damage. The medium CVSS score indicates moderate ease of exploitation but significant potential impact if exploited. The lack of known active exploits currently reduces immediate risk but does not eliminate it, especially given the public disclosure.
Mitigation Recommendations
1. Apply official patches or updates from FastAdmin as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict access to the Backend Controller's selectpage function to trusted administrators only, using network segmentation and access control lists. 3. Implement rigorous input validation and sanitization on the custom/searchField parameter to prevent malicious SQL code injection. 4. Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection attempts targeting this parameter. 5. Conduct regular security audits and code reviews focusing on input handling in backend controllers. 6. Monitor logs for unusual database queries or failed authentication attempts indicative of exploitation attempts. 7. Educate developers and administrators about the risks of SQL injection and secure coding practices to prevent similar vulnerabilities. 8. Consider deploying database activity monitoring tools to detect anomalous SQL commands in real time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T10:46:01.207Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6945aa0f94037f6b535451d0
Added to database: 12/19/2025, 7:39:59 PM
Last enriched: 2/24/2026, 11:08:30 PM
Last updated: 3/24/2026, 12:16:36 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.