Skip to main content

CVE-2025-30975: CWE-94 Improper Control of Generation of Code ('Code Injection') in SaifuMak Add Custom Codes

High
VulnerabilityCVE-2025-30975cvecve-2025-30975cwe-94
Published: Wed Aug 20 2025 (08/20/2025, 08:03:47 UTC)
Source: CVE Database V5
Vendor/Project: SaifuMak
Product: Add Custom Codes

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in SaifuMak Add Custom Codes allows Code Injection. This issue affects Add Custom Codes: from n/a through 4.80.

AI-Powered Analysis

AILast updated: 08/20/2025, 10:04:04 UTC

Technical Analysis

CVE-2025-30975 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects the SaifuMak product named 'Add Custom Codes' up to version 4.80. The flaw allows an attacker to inject arbitrary code into the system through the 'Add Custom Codes' functionality, potentially leading to remote code execution. The CVSS 3.1 base score of 7.5 indicates a high impact, with the vector string AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H specifying that the attack can be performed remotely over the network, requires low privileges, no user interaction, and has high impact on confidentiality, integrity, and availability. The vulnerability arises because the product does not properly validate or sanitize input that is used to generate code dynamically, allowing malicious input to be executed. Although no known exploits are currently reported in the wild, the nature of code injection vulnerabilities makes this a critical risk if weaponized. The lack of available patches at the time of publication increases the urgency for mitigation. Given the ability to execute arbitrary code remotely, attackers could compromise systems, steal sensitive data, disrupt services, or use the affected systems as footholds for further attacks.

Potential Impact

For European organizations, the impact of CVE-2025-30975 could be significant, especially for those relying on SaifuMak's 'Add Custom Codes' product in their IT infrastructure. Successful exploitation could lead to unauthorized access to sensitive corporate data, intellectual property theft, and disruption of business-critical applications. The high confidentiality, integrity, and availability impacts mean that attackers could not only exfiltrate data but also modify or destroy it, and cause denial of service. This could affect sectors with high regulatory requirements such as finance, healthcare, and government agencies, potentially leading to compliance violations under GDPR and other data protection laws. Additionally, the ability to execute code remotely without user interaction increases the risk of automated attacks and worm-like propagation within networks. The absence of patches means organizations must rely on compensating controls to prevent exploitation, which may increase operational complexity and cost. The reputational damage and financial losses from a successful attack could be substantial, making this vulnerability a critical concern for European enterprises.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict network access to the 'Add Custom Codes' functionality by applying strict firewall rules and network segmentation to limit exposure to trusted users and systems only. Second, implement application-layer input validation and sanitization proxies or web application firewalls (WAFs) configured to detect and block suspicious code injection patterns targeting this product. Third, monitor logs and network traffic for anomalous activities indicative of code injection attempts or unauthorized code execution. Fourth, enforce the principle of least privilege by ensuring that accounts with access to the vulnerable functionality have minimal permissions and that multi-factor authentication is enabled where possible. Fifth, conduct thorough code reviews and penetration testing focused on this component to identify and remediate any exploitable vectors. Finally, maintain close communication with SaifuMak for timely updates and patches, and prepare for rapid deployment once fixes become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-26T09:22:34.906Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a584b3ad5a09ad0002e288

Added to database: 8/20/2025, 8:17:55 AM

Last enriched: 8/20/2025, 10:04:04 AM

Last updated: 8/27/2025, 12:34:26 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats