Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15002: SQL Injection in SeaCMS

0
Medium
VulnerabilityCVE-2025-15002cvecve-2025-15002
Published: Sun Dec 21 2025 (12/21/2025, 23:02:07 UTC)
Source: CVE Database V5
Product: SeaCMS

Description

A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 12/21/2025, 23:28:53 UTC

Technical Analysis

CVE-2025-15002 is a SQL injection vulnerability identified in SeaCMS, a content management system, affecting versions 13.0 through 13.3. The vulnerability resides in an unspecified function within the PHP file located at js/player/dmplayer/dmku/class/mysqli.class.php. Specifically, the parameters 'page' and 'limit' can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the database, potentially allowing attackers to extract sensitive information, modify or delete data, or disrupt service availability. Although no exploits have been observed in the wild yet, the public disclosure of exploit details increases the likelihood of exploitation attempts. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation and the potential impact. The lack of patches or official fixes at the time of disclosure necessitates immediate mitigation efforts by affected organizations. The vulnerability is particularly critical for websites and services relying on SeaCMS for content delivery, as successful exploitation could lead to data breaches or defacement.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of web applications running SeaCMS, especially those managing sensitive or regulated data. Exploitation could lead to unauthorized disclosure of personal data, violating GDPR requirements and resulting in legal and financial penalties. Integrity of data could be compromised, affecting business operations and trustworthiness of published content. Availability could also be impacted if attackers execute destructive SQL commands or cause database corruption. Organizations in sectors such as government, healthcare, finance, and media that use SeaCMS for public-facing or internal websites are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European entities without prior access. The public availability of exploit details may lead to increased scanning and exploitation attempts, necessitating urgent attention to mitigate risks.

Mitigation Recommendations

1. Immediate application of any official patches or updates from SeaCMS developers once available. 2. In the absence of patches, implement strict input validation and sanitization on the 'page' and 'limit' parameters to prevent injection of malicious SQL code. 3. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting SeaCMS. 4. Conduct thorough code reviews and security testing focusing on database query construction and parameter handling in the affected file and related components. 5. Monitor web server and database logs for unusual query patterns or repeated access attempts to the vulnerable parameters. 6. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 7. Educate development and operations teams about secure coding practices and the risks of SQL injection. 8. Consider isolating or segmenting SeaCMS instances to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-21T08:31:08.755Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69487f303ccd96b7b73da3e2

Added to database: 12/21/2025, 11:13:52 PM

Last enriched: 12/21/2025, 11:28:53 PM

Last updated: 12/22/2025, 1:07:30 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats