Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14966: SQL Injection in FastAdmin

0
Medium
VulnerabilityCVE-2025-14966cvecve-2025-14966
Published: Fri Dec 19 2025 (12/19/2025, 19:32:08 UTC)
Source: CVE Database V5
Product: FastAdmin

Description

A vulnerability was determined in FastAdmin up to 1.7.0.20250506. Affected is the function selectpage of the file application/common/controller/Backend.php of the component Backend Controller. Executing a manipulation of the argument custom/searchField can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:08:30 UTC

Technical Analysis

CVE-2025-14966 identifies a SQL injection vulnerability in FastAdmin, an open-source rapid development framework for backend management systems. The flaw exists in the selectpage function within the Backend Controller component (application/common/controller/Backend.php). Specifically, the vulnerability stems from insufficient input validation and sanitization of the custom/searchField parameter, which is used directly in SQL queries. An attacker with high privileges can remotely manipulate this parameter to inject malicious SQL code, potentially leading to unauthorized data retrieval, modification, or deletion. The vulnerability does not require user interaction but does require authentication with elevated privileges, limiting the attack surface somewhat. The CVSS 4.0 base score is 5.1 (medium), reflecting the moderate impact and exploitation complexity. No patches or fixes have been explicitly linked yet, and no active exploits have been reported, but the public disclosure increases the urgency for remediation. The vulnerability affects FastAdmin version 1.7.0.20250506 and earlier. Given FastAdmin's use in web applications, exploitation could compromise backend databases, leading to data breaches or service disruptions.

Potential Impact

The SQL injection vulnerability can lead to unauthorized access to sensitive backend data, data corruption, or deletion, impacting confidentiality, integrity, and availability of organizational data. Attackers with high privileges could leverage this flaw to escalate their access or manipulate database contents, potentially affecting business operations and customer trust. The ability to execute arbitrary SQL commands remotely increases the risk of large-scale data breaches or service outages. Organizations relying on FastAdmin for critical backend management systems may face operational disruptions, regulatory compliance issues, and reputational damage. The medium CVSS score indicates moderate ease of exploitation but significant potential impact if exploited. The lack of known active exploits currently reduces immediate risk but does not eliminate it, especially given the public disclosure.

Mitigation Recommendations

1. Apply official patches or updates from FastAdmin as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict access to the Backend Controller's selectpage function to trusted administrators only, using network segmentation and access control lists. 3. Implement rigorous input validation and sanitization on the custom/searchField parameter to prevent malicious SQL code injection. 4. Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection attempts targeting this parameter. 5. Conduct regular security audits and code reviews focusing on input handling in backend controllers. 6. Monitor logs for unusual database queries or failed authentication attempts indicative of exploitation attempts. 7. Educate developers and administrators about the risks of SQL injection and secure coding practices to prevent similar vulnerabilities. 8. Consider deploying database activity monitoring tools to detect anomalous SQL commands in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-19T10:46:01.207Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6945aa0f94037f6b535451d0

Added to database: 12/19/2025, 7:39:59 PM

Last enriched: 2/24/2026, 11:08:30 PM

Last updated: 3/24/2026, 12:16:36 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses