Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15492: SQL Injection in RainyGao DocSys

0
Medium
VulnerabilityCVE-2025-15492cvecve-2025-15492
Published: Fri Jan 09 2026 (01/09/2026, 16:02:07 UTC)
Source: CVE Database V5
Vendor/Project: RainyGao
Product: DocSys

Description

A vulnerability was detected in RainyGao DocSys up to 2.02.36. The affected element is an unknown function of the file src/com/DocSystem/mapping/GroupMemberMapper.xml. Performing a manipulation of the argument searchWord results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:38:20 UTC

Technical Analysis

CVE-2025-15492 is a SQL injection vulnerability identified in the RainyGao DocSys product, specifically affecting all versions up to 2.02.36. The vulnerability resides in an unspecified function within the XML mapping file src/com/DocSystem/mapping/GroupMemberMapper.xml. Attackers can exploit the vulnerability by manipulating the 'searchWord' parameter, which is improperly sanitized, allowing malicious SQL statements to be injected and executed on the backend database. This injection flaw can be triggered remotely without requiring user interaction, though it requires low privileges (PR:L) on the system. The vulnerability impacts the confidentiality, integrity, and availability of the system to a limited extent, as indicated by the CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:L/VI:L/VA:L). The vendor has not responded to disclosure attempts, and no official patches have been released, although public exploit code is available, increasing the risk of exploitation. The vulnerability affects a wide range of versions, making many deployments vulnerable. The lack of authentication bypass means attackers need some level of access, but the ease of exploitation and remote attack vector make it a significant concern for organizations using this software.

Potential Impact

The SQL injection vulnerability in RainyGao DocSys can allow attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. This can compromise sensitive organizational information, disrupt document management workflows, and degrade system availability. Given the remote attack vector and the availability of public exploits, attackers could leverage this vulnerability to escalate privileges, extract confidential data, or corrupt data integrity. Organizations relying on DocSys for critical document handling may face operational disruptions, reputational damage, and regulatory compliance issues if exploited. The medium severity reflects partial but meaningful impact on confidentiality, integrity, and availability, with exploitation requiring some privileges but no user interaction, increasing the risk in environments where low-privilege accounts exist.

Mitigation Recommendations

Organizations should immediately audit their deployments of RainyGao DocSys to identify affected versions up to 2.02.36. Since no official patch is available, mitigation should focus on implementing strict input validation and sanitization for the 'searchWord' parameter at the application or database query layer to prevent injection. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this parameter can reduce risk. Restricting database user privileges to the minimum necessary can limit the impact of a successful injection. Monitoring logs for unusual database queries or errors related to 'searchWord' can help detect exploitation attempts. Organizations should also isolate DocSys instances from public networks or restrict access to trusted users only. Preparing for vendor updates and applying patches promptly once available is critical. Additionally, consider code review or third-party security assessments to identify and remediate similar injection points.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T11:30:38.788Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69612bfb6c9099d823dc1091

Added to database: 1/9/2026, 4:25:31 PM

Last enriched: 2/23/2026, 10:38:20 PM

Last updated: 3/26/2026, 4:33:46 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses