Skip to main content

CVE-2025-31926: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LambertGroup Sticky Radio Player

High
VulnerabilityCVE-2025-31926cvecve-2025-31926cwe-89
Published: Fri May 16 2025 (05/16/2025, 15:45:34 UTC)
Source: CVE
Vendor/Project: LambertGroup
Product: Sticky Radio Player

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup Sticky Radio Player allows SQL Injection. This issue affects Sticky Radio Player: from n/a through 3.4.

AI-Powered Analysis

AILast updated: 07/11/2025, 22:18:29 UTC

Technical Analysis

CVE-2025-31926 is a high-severity SQL Injection vulnerability (CWE-89) found in the LambertGroup Sticky Radio Player software, affecting versions up to 3.4. The vulnerability arises from improper neutralization of special elements in SQL commands, allowing an attacker with low privileges (PR:L) and no user interaction (UI:N) to remotely exploit the flaw over the network (AV:N). The vulnerability impacts confidentiality (C:H) by potentially allowing unauthorized data disclosure, while integrity is not affected (I:N), and availability impact is low (A:L). The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component, possibly impacting the underlying database or other connected systems. Although no known exploits are currently reported in the wild, the CVSS score of 8.5 reflects a significant risk due to ease of exploitation and potential data exposure. The vulnerability affects Sticky Radio Player, a web-based radio player software, which likely interacts with backend databases to manage playlists, user data, or streaming metadata. An attacker exploiting this SQL Injection could extract sensitive information from the database, such as user credentials or configuration data, or potentially leverage the flaw for further attacks within the network.

Potential Impact

For European organizations using LambertGroup Sticky Radio Player, this vulnerability poses a serious risk to the confidentiality of sensitive data stored in backend databases. Given the high CVSS score and the ability to exploit remotely without user interaction, attackers could exfiltrate private user information or internal configuration details, potentially leading to data breaches and regulatory non-compliance under GDPR. The changed scope means that the impact could extend beyond the application itself, affecting other connected systems or databases. This could disrupt business operations, damage reputation, and incur financial penalties. Organizations in sectors such as media, broadcasting, or any industry relying on streaming services that utilize Sticky Radio Player are particularly at risk. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity demands immediate attention.

Mitigation Recommendations

1. Immediate patching: Although no patch links are currently provided, organizations should monitor LambertGroup's official channels for security updates and apply patches promptly once available. 2. Input validation and parameterized queries: Until a patch is released, implement strict input validation and use parameterized queries or prepared statements in any custom integrations with Sticky Radio Player to prevent injection of malicious SQL code. 3. Web application firewall (WAF): Deploy or update WAF rules to detect and block SQL Injection attempts targeting Sticky Radio Player endpoints. 4. Least privilege principle: Restrict database user permissions used by Sticky Radio Player to only necessary operations, minimizing potential data exposure if exploited. 5. Network segmentation: Isolate the application and its database from critical internal systems to limit lateral movement in case of compromise. 6. Monitoring and logging: Enhance monitoring of database queries and application logs for suspicious activities indicative of SQL Injection attempts. 7. Incident response readiness: Prepare incident response plans specific to SQL Injection attacks, including data breach notification procedures compliant with GDPR.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-01T13:21:56.251Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebcee

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 10:18:29 PM

Last updated: 7/26/2025, 9:51:27 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats