CVE-2025-14966: SQL Injection in FastAdmin
A vulnerability was determined in FastAdmin up to 1.7.0.20250506. Affected is the function selectpage of the file application/common/controller/Backend.php of the component Backend Controller. Executing manipulation of the argument custom/searchField can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-14966 identifies an SQL injection vulnerability in the FastAdmin framework, specifically affecting the selectpage function within the Backend Controller component (application/common/controller/Backend.php). The vulnerability arises from improper sanitization of the custom/searchField parameter, which attackers can manipulate to inject malicious SQL queries. This flaw allows remote exploitation without requiring user interaction or authentication, enabling attackers to execute arbitrary SQL commands on the backend database. Potential consequences include unauthorized data access, data modification, or deletion, and possible disruption of service availability. The vulnerability affects FastAdmin versions up to 1.7.0.20250506. Although the CVSS 4.0 base score is 5.1 (medium severity), reflecting limited scope and impact on confidentiality, integrity, and availability, the exploitability is high due to low attack complexity and no user interaction needed. No known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. The vulnerability is critical for organizations relying on FastAdmin for backend management, especially those handling sensitive or regulated data. The lack of available patches at the time of disclosure necessitates immediate mitigation through input validation and access controls until official fixes are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of data managed via FastAdmin-based backend systems. Exploitation could lead to unauthorized data disclosure, modification, or deletion, potentially impacting customer data, intellectual property, or operational data. This could result in regulatory non-compliance, especially under GDPR, leading to legal and financial penalties. Service disruption caused by database manipulation could affect business continuity and damage organizational reputation. Given the remote exploitability without authentication, attackers can target exposed FastAdmin instances over the internet, increasing the attack surface. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that utilize FastAdmin are particularly vulnerable. The medium severity score suggests moderate impact, but the ease of exploitation and potential data sensitivity elevate the threat level. The absence of known exploits currently provides a window for proactive defense, but the public disclosure increases the urgency for mitigation.
Mitigation Recommendations
1. Monitor FastAdmin vendor communications closely and apply official patches immediately upon release. 2. Implement strict input validation and sanitization on the custom/searchField parameter to prevent injection of malicious SQL code. 3. Restrict access to the Backend Controller endpoints by IP whitelisting or VPN to limit exposure to trusted users only. 4. Employ Web Application Firewalls (WAF) with rules designed to detect and block SQL injection attempts targeting FastAdmin. 5. Conduct regular security assessments and penetration testing focusing on backend interfaces to identify similar injection flaws. 6. Review and harden database permissions to minimize the impact of potential SQL injection exploitation. 7. Enable detailed logging and monitoring of backend access and query anomalies to detect exploitation attempts early. 8. Educate development and operations teams about secure coding practices and the risks of unsanitized input parameters. 9. Consider isolating FastAdmin backend services in segmented network zones to reduce lateral movement risk. 10. Prepare incident response plans specific to SQL injection attacks to ensure rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14966: SQL Injection in FastAdmin
Description
A vulnerability was determined in FastAdmin up to 1.7.0.20250506. Affected is the function selectpage of the file application/common/controller/Backend.php of the component Backend Controller. Executing manipulation of the argument custom/searchField can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-14966 identifies an SQL injection vulnerability in the FastAdmin framework, specifically affecting the selectpage function within the Backend Controller component (application/common/controller/Backend.php). The vulnerability arises from improper sanitization of the custom/searchField parameter, which attackers can manipulate to inject malicious SQL queries. This flaw allows remote exploitation without requiring user interaction or authentication, enabling attackers to execute arbitrary SQL commands on the backend database. Potential consequences include unauthorized data access, data modification, or deletion, and possible disruption of service availability. The vulnerability affects FastAdmin versions up to 1.7.0.20250506. Although the CVSS 4.0 base score is 5.1 (medium severity), reflecting limited scope and impact on confidentiality, integrity, and availability, the exploitability is high due to low attack complexity and no user interaction needed. No known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. The vulnerability is critical for organizations relying on FastAdmin for backend management, especially those handling sensitive or regulated data. The lack of available patches at the time of disclosure necessitates immediate mitigation through input validation and access controls until official fixes are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of data managed via FastAdmin-based backend systems. Exploitation could lead to unauthorized data disclosure, modification, or deletion, potentially impacting customer data, intellectual property, or operational data. This could result in regulatory non-compliance, especially under GDPR, leading to legal and financial penalties. Service disruption caused by database manipulation could affect business continuity and damage organizational reputation. Given the remote exploitability without authentication, attackers can target exposed FastAdmin instances over the internet, increasing the attack surface. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that utilize FastAdmin are particularly vulnerable. The medium severity score suggests moderate impact, but the ease of exploitation and potential data sensitivity elevate the threat level. The absence of known exploits currently provides a window for proactive defense, but the public disclosure increases the urgency for mitigation.
Mitigation Recommendations
1. Monitor FastAdmin vendor communications closely and apply official patches immediately upon release. 2. Implement strict input validation and sanitization on the custom/searchField parameter to prevent injection of malicious SQL code. 3. Restrict access to the Backend Controller endpoints by IP whitelisting or VPN to limit exposure to trusted users only. 4. Employ Web Application Firewalls (WAF) with rules designed to detect and block SQL injection attempts targeting FastAdmin. 5. Conduct regular security assessments and penetration testing focusing on backend interfaces to identify similar injection flaws. 6. Review and harden database permissions to minimize the impact of potential SQL injection exploitation. 7. Enable detailed logging and monitoring of backend access and query anomalies to detect exploitation attempts early. 8. Educate development and operations teams about secure coding practices and the risks of unsanitized input parameters. 9. Consider isolating FastAdmin backend services in segmented network zones to reduce lateral movement risk. 10. Prepare incident response plans specific to SQL injection attacks to ensure rapid containment and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-19T10:46:01.207Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6945aa0f94037f6b535451d0
Added to database: 12/19/2025, 7:39:59 PM
Last enriched: 12/19/2025, 7:55:08 PM
Last updated: 12/19/2025, 8:40:43 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67712: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Esri ArcGIS Web AppBuilder {Developer Edition)
MediumCVE-2025-14968: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-12874: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Quest Coexistence Manager for Notes
MediumCVE-2025-14967: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14964: Stack-based Buffer Overflow in TOTOLINK T10
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.