Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-28904: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Shamalli Web Directory Free

0
Unknown
VulnerabilityCVE-2025-28904cvecve-2025-28904
Published: Tue Mar 25 2025 (03/25/2025, 18:48:24 UTC)
Source: CVE Database V5
Vendor/Project: Shamalli
Product: Web Directory Free

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shamalli Web Directory Free web-directory-free allows Blind SQL Injection.This issue affects Web Directory Free: from n/a through <= 1.7.6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 23:36:31 UTC

Technical Analysis

CVE-2025-28904 identifies a Blind SQL Injection vulnerability in Shamalli Web Directory Free, a web-based directory management application. The vulnerability arises from improper neutralization of special characters in SQL commands, allowing attackers to inject arbitrary SQL code. Blind SQL Injection means attackers cannot directly see the results of their injected queries but can infer data through timing or boolean responses. This flaw affects all versions up to and including 1.7.6. The vulnerability enables attackers to bypass authentication, extract sensitive information from the database, modify or delete data, and potentially escalate privileges within the application. The lack of a CVSS score suggests the vulnerability is newly disclosed, with no official patches or exploit code publicly available yet. The vulnerability is critical because it targets the database backend, which often contains sensitive user and configuration data. Exploitation requires only network access to the vulnerable web application and no user interaction, making it easier for remote attackers to exploit. The absence of known exploits in the wild does not diminish the risk, as SQL Injection remains one of the most common and impactful web vulnerabilities. Organizations using Shamalli Web Directory Free should monitor for updates and consider immediate protective measures.

Potential Impact

The impact of CVE-2025-28904 is significant for organizations using Shamalli Web Directory Free. Successful exploitation can lead to unauthorized disclosure of sensitive data, including user credentials, configuration details, and potentially other connected systems' information. Data integrity can be compromised by unauthorized modification or deletion of database records, disrupting directory services and potentially affecting dependent applications. Availability may also be impacted if attackers execute destructive SQL commands or cause database corruption. The vulnerability can serve as a foothold for further attacks within an organization's network, including lateral movement and privilege escalation. Given the ease of exploitation without authentication or user interaction, attackers can remotely target vulnerable systems at scale. Organizations relying on this software for public-facing web directories are particularly at risk of data breaches and reputational damage. The lack of patches increases exposure time, amplifying potential damage. Overall, the threat poses a high risk to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

To mitigate CVE-2025-28904, organizations should immediately implement the following measures: 1) Apply any available vendor patches or updates as soon as they are released. 2) If patches are not yet available, employ web application firewalls (WAFs) with rules specifically designed to detect and block SQL Injection attempts targeting Shamalli Web Directory Free. 3) Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. 4) Employ parameterized queries or prepared statements in the application code to prevent injection of malicious SQL. 5) Restrict database user permissions to the minimum necessary to limit the impact of any injection attack. 6) Monitor web server and database logs for unusual query patterns or repeated failed requests indicative of exploitation attempts. 7) Segment the network to isolate the web directory server from critical internal systems. 8) Consider temporarily disabling or restricting access to the vulnerable web directory until a patch is available. 9) Educate developers and administrators about secure coding practices to prevent similar vulnerabilities. These targeted actions go beyond generic advice and focus on immediate risk reduction and long-term prevention.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:09:18.300Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72eae6bfc5ba1deef4fb

Added to database: 4/1/2026, 7:32:58 PM

Last enriched: 4/1/2026, 11:36:31 PM

Last updated: 4/6/2026, 9:32:55 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses