CVE-2025-15002: SQL Injection in SeaCMS
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-15002 is a SQL injection vulnerability identified in SeaCMS, a content management system, affecting versions 13.0 through 13.3. The vulnerability resides in an unspecified function within the PHP file located at js/player/dmplayer/dmku/class/mysqli.class.php. Specifically, the parameters 'page' and 'limit' can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the database, potentially allowing attackers to extract sensitive information, modify or delete data, or disrupt service availability. Although no exploits have been observed in the wild yet, the public disclosure of exploit details increases the likelihood of exploitation attempts. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation and the potential impact. The lack of patches or official fixes at the time of disclosure necessitates immediate mitigation efforts by affected organizations. The vulnerability is particularly critical for websites and services relying on SeaCMS for content delivery, as successful exploitation could lead to data breaches or defacement.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of web applications running SeaCMS, especially those managing sensitive or regulated data. Exploitation could lead to unauthorized disclosure of personal data, violating GDPR requirements and resulting in legal and financial penalties. Integrity of data could be compromised, affecting business operations and trustworthiness of published content. Availability could also be impacted if attackers execute destructive SQL commands or cause database corruption. Organizations in sectors such as government, healthcare, finance, and media that use SeaCMS for public-facing or internal websites are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European entities without prior access. The public availability of exploit details may lead to increased scanning and exploitation attempts, necessitating urgent attention to mitigate risks.
Mitigation Recommendations
1. Immediate application of any official patches or updates from SeaCMS developers once available. 2. In the absence of patches, implement strict input validation and sanitization on the 'page' and 'limit' parameters to prevent injection of malicious SQL code. 3. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting SeaCMS. 4. Conduct thorough code reviews and security testing focusing on database query construction and parameter handling in the affected file and related components. 5. Monitor web server and database logs for unusual query patterns or repeated access attempts to the vulnerable parameters. 6. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 7. Educate development and operations teams about secure coding practices and the risks of SQL injection. 8. Consider isolating or segmenting SeaCMS instances to limit lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-15002: SQL Injection in SeaCMS
Description
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-15002 is a SQL injection vulnerability identified in SeaCMS, a content management system, affecting versions 13.0 through 13.3. The vulnerability resides in an unspecified function within the PHP file located at js/player/dmplayer/dmku/class/mysqli.class.php. Specifically, the parameters 'page' and 'limit' can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The vulnerability impacts the confidentiality, integrity, and availability of the database, potentially allowing attackers to extract sensitive information, modify or delete data, or disrupt service availability. Although no exploits have been observed in the wild yet, the public disclosure of exploit details increases the likelihood of exploitation attempts. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation and the potential impact. The lack of patches or official fixes at the time of disclosure necessitates immediate mitigation efforts by affected organizations. The vulnerability is particularly critical for websites and services relying on SeaCMS for content delivery, as successful exploitation could lead to data breaches or defacement.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of web applications running SeaCMS, especially those managing sensitive or regulated data. Exploitation could lead to unauthorized disclosure of personal data, violating GDPR requirements and resulting in legal and financial penalties. Integrity of data could be compromised, affecting business operations and trustworthiness of published content. Availability could also be impacted if attackers execute destructive SQL commands or cause database corruption. Organizations in sectors such as government, healthcare, finance, and media that use SeaCMS for public-facing or internal websites are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target European entities without prior access. The public availability of exploit details may lead to increased scanning and exploitation attempts, necessitating urgent attention to mitigate risks.
Mitigation Recommendations
1. Immediate application of any official patches or updates from SeaCMS developers once available. 2. In the absence of patches, implement strict input validation and sanitization on the 'page' and 'limit' parameters to prevent injection of malicious SQL code. 3. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attempts targeting SeaCMS. 4. Conduct thorough code reviews and security testing focusing on database query construction and parameter handling in the affected file and related components. 5. Monitor web server and database logs for unusual query patterns or repeated access attempts to the vulnerable parameters. 6. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 7. Educate development and operations teams about secure coding practices and the risks of SQL injection. 8. Consider isolating or segmenting SeaCMS instances to limit lateral movement in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-21T08:31:08.755Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69487f303ccd96b7b73da3e2
Added to database: 12/21/2025, 11:13:52 PM
Last enriched: 12/21/2025, 11:28:53 PM
Last updated: 12/22/2025, 1:07:30 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15005: Use of Hard-coded Cryptographic Key in CouchCMS
MediumCVE-2025-15004: SQL Injection in DedeCMS
MediumCVE-2025-15003: SQL Injection in SeaCMS
MediumCVE-2025-62926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in HappyDevs TempTool
MediumCVE-2025-62901: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Tormorten WP Microdata
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.