Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15169: SQL Injection in BiggiDroid Simple PHP CMS

0
Medium
VulnerabilityCVE-2025-15169cvecve-2025-15169
Published: Mon Dec 29 2025 (12/29/2025, 03:02:09 UTC)
Source: CVE Database V5
Vendor/Project: BiggiDroid
Product: Simple PHP CMS

Description

A weakness has been identified in BiggiDroid Simple PHP CMS 1.0. Affected by this issue is some unknown functionality of the file /admin/editsite.php. Executing a manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:35:01 UTC

Technical Analysis

CVE-2025-15169 is a SQL injection vulnerability identified in BiggiDroid Simple PHP CMS version 1.0, located in the /admin/editsite.php script. The issue stems from insufficient input validation or sanitization of the 'ID' parameter, which is used in SQL queries without proper escaping or parameterization. This flaw allows an authenticated attacker with high privileges to inject malicious SQL code remotely, potentially manipulating the backend database. The vulnerability does not require user interaction but does require the attacker to be authenticated with elevated privileges, which limits the attack surface but still poses a significant risk. The vendor was notified early but has not issued any patches or responses, and public exploit code has been released, increasing the likelihood of exploitation attempts. The CVSS v4.0 base score is 5.1 (medium severity), reflecting the moderate impact and exploitation complexity. The vulnerability can lead to unauthorized data disclosure, data modification, or denial of service by corrupting database contents or disrupting CMS operations. No known active exploitation in the wild has been reported to date. Organizations running this CMS should consider immediate mitigation steps or migration, as the lack of vendor response leaves systems exposed.

Potential Impact

The SQL injection vulnerability in BiggiDroid Simple PHP CMS 1.0 can have serious consequences for organizations using this software. Successful exploitation can lead to unauthorized access to sensitive data stored in the CMS database, including potentially user credentials, site content, or configuration details. Attackers could modify or delete data, undermining data integrity and availability of the CMS. This could disrupt website operations, damage organizational reputation, and lead to regulatory compliance issues if sensitive data is exposed. Since the vulnerability requires authenticated access with high privileges, insider threats or compromised admin accounts pose a significant risk. The availability of public exploit code increases the likelihood of exploitation attempts, especially in environments where patching or mitigation is delayed. Organizations relying on this CMS for critical web presence or data management are at risk of targeted attacks, data breaches, and service disruptions.

Mitigation Recommendations

To mitigate CVE-2025-15169, organizations should first restrict access to the /admin/editsite.php functionality to trusted administrators only, implementing strong authentication and network segmentation to reduce exposure. Since no official patch is available, applying web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'ID' parameter can provide temporary protection. Code-level mitigation involves reviewing and refactoring the vulnerable code to use parameterized queries or prepared statements, ensuring all user inputs are properly sanitized and validated. Regularly auditing and monitoring logs for suspicious activity related to the editsite.php endpoint is critical. Organizations should also consider migrating to alternative CMS platforms with active vendor support or newer versions if available. Finally, enforcing the principle of least privilege for admin accounts and using multi-factor authentication can reduce the risk of exploitation by compromised credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T23:20:14.111Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450badb813ff03e2bf7af

Added to database: 12/30/2025, 10:22:50 PM

Last enriched: 2/24/2026, 10:35:01 PM

Last updated: 3/25/2026, 9:48:28 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses