Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15493: SQL Injection in RainyGao DocSys

0
Medium
VulnerabilityCVE-2025-15493cvecve-2025-15493
Published: Fri Jan 09 2026 (01/09/2026, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: RainyGao
Product: DocSys

Description

A flaw has been found in RainyGao DocSys up to 2.02.36. The impacted element is an unknown function of the file src/com/DocSystem/mapping/ReposAuthMapper.xml. Executing a manipulation of the argument searchWord can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:38:29 UTC

Technical Analysis

CVE-2025-15493 identifies a SQL injection vulnerability in the RainyGao DocSys product, specifically affecting all versions up to 2.02.36. The vulnerability resides in an unspecified function within the XML mapping file src/com/DocSystem/mapping/ReposAuthMapper.xml, where the argument searchWord is improperly sanitized, allowing attackers to inject malicious SQL commands. This injection flaw can be exploited remotely without requiring authentication or user interaction, increasing the attack surface significantly. The vulnerability's CVSS 4.0 base score is 5.3, reflecting medium severity, with network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. The vendor was notified early but has not issued any response or patch, and a public exploit is available, raising the risk of exploitation. The lack of patch and vendor engagement means organizations must rely on alternative mitigations. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt service availability by manipulating backend SQL queries through the vulnerable parameter.

Potential Impact

The SQL injection vulnerability in DocSys can lead to unauthorized data access, data modification, or deletion, compromising the confidentiality, integrity, and availability of organizational data managed by DocSys. Attackers could leverage this flaw to extract sensitive documents, escalate privileges, or disrupt document management operations, potentially impacting business continuity. Since the exploit requires no authentication and can be launched remotely, the risk of widespread exploitation is significant, especially in environments where DocSys is exposed to the internet or untrusted networks. Organizations relying on DocSys for critical document workflows may face operational disruptions, data breaches, and compliance violations. The absence of vendor patches increases the window of exposure, making timely mitigation essential to reduce risk.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement the following specific mitigations: 1) Restrict network access to DocSys instances by enforcing strict firewall rules and limiting exposure to trusted internal networks only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the searchWord parameter. 3) Conduct thorough input validation and sanitization at the application or proxy level if possible, especially for parameters interacting with database queries. 4) Monitor logs for suspicious query patterns or repeated failed attempts indicative of injection attempts. 5) Consider deploying database activity monitoring to detect anomalous SQL commands. 6) Plan for migration or replacement of DocSys if vendor support remains unavailable. 7) Isolate DocSys environments to minimize lateral movement in case of compromise. 8) Educate security teams about this vulnerability and ensure incident response plans include this threat scenario.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T11:30:44.838Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696132fa6c9099d823e56075

Added to database: 1/9/2026, 4:55:22 PM

Last enriched: 2/23/2026, 10:38:29 PM

Last updated: 3/24/2026, 11:18:55 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses