Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15446: SQL Injection in Seeyon Zhiyuan OA Web Application System

0
Medium
VulnerabilityCVE-2025-15446cvecve-2025-15446
Published: Sun Jan 04 2026 (01/04/2026, 23:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Seeyon
Product: Zhiyuan OA Web Application System

Description

A flaw has been found in Seeyon Zhiyuan OA Web Application System up to 20251223. The impacted element is an unknown function of the file /assetsGroupReport/fixedAssetsList.j%73p. Executing a manipulation of the argument unitCode can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/04/2026, 23:28:50 UTC

Technical Analysis

CVE-2025-15446 identifies a SQL injection vulnerability in the Seeyon Zhiyuan OA Web Application System, version 20251223 and earlier. The vulnerability resides in an unspecified function within the /assetsGroupReport/fixedAssetsList.jsp endpoint, where the unitCode parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This injection flaw enables remote, unauthenticated attackers to manipulate backend database queries, potentially extracting sensitive information, modifying data, or disrupting application functionality. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 6.9 reflects medium severity, considering the ease of exploitation and partial impact on confidentiality, integrity, and availability. The vendor was notified but has not issued a patch or response, and a public exploit has been published, raising the risk of exploitation. The lack of vendor response and patch availability means organizations must rely on compensating controls. The vulnerability affects a widely used office automation (OA) system, which is often deployed in enterprise and government environments for document management and workflow automation. Exploitation could lead to unauthorized data access, data corruption, or disruption of business processes. The attack vector is network-based, requiring only that the attacker send crafted requests to the vulnerable endpoint. No authentication or user interaction is required, making automated exploitation feasible. The vulnerability does not require special privileges and does not involve supply chain or third-party components. Given the nature of the affected system, the impact could extend to sensitive organizational data and internal communications.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive corporate or governmental data managed within the Seeyon Zhiyuan OA system. This could lead to data breaches, loss of data integrity, and disruption of critical office automation workflows. The compromise of internal documents or financial records could have regulatory and reputational consequences, especially under GDPR and other data protection laws. The availability of a public exploit increases the likelihood of targeted attacks or opportunistic scanning by threat actors. Organizations relying on this OA system for internal communications or asset management could experience operational disruptions. Additionally, if attackers leverage the SQL injection to escalate privileges or pivot within the network, broader compromise is possible. The medium severity rating suggests a significant but not catastrophic impact, yet the absence of vendor patches elevates the risk profile. European entities in sectors such as government, finance, and critical infrastructure using Seeyon products are particularly vulnerable to espionage or sabotage attempts. The potential for data exfiltration or manipulation could undermine trust and compliance with regulatory frameworks.

Mitigation Recommendations

Since no official patch is available, European organizations should implement immediate compensating controls. First, deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the unitCode parameter and the /assetsGroupReport/fixedAssetsList.jsp endpoint. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters interacting with databases. Restrict access to the vulnerable endpoint via network segmentation or IP whitelisting where feasible. Monitor application logs and network traffic for anomalous patterns indicative of SQL injection attempts. Employ database activity monitoring to detect suspicious queries or unauthorized data access. Consider temporary disabling or restricting the vulnerable functionality if business operations allow. Educate security teams and incident responders about this vulnerability and the availability of public exploits to prepare for potential incidents. Plan for an eventual upgrade or patch deployment once the vendor releases a fix. Regularly review and update security policies to include detection and response strategies for SQL injection attacks. Engage with Seeyon or third-party security vendors for potential custom patches or mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T08:35:08.234Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695af456db813ff03ef034af

Added to database: 1/4/2026, 11:14:30 PM

Last enriched: 1/4/2026, 11:28:50 PM

Last updated: 1/8/2026, 7:22:41 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats