Skip to main content

CVE-2025-4353: SQL Injection in Brilliance Golden Link Secondary System

Medium
VulnerabilityCVE-2025-4353cvecve-2025-4353
Published: Tue May 06 2025 (05/06/2025, 12:00:09 UTC)
Source: CVE
Vendor/Project: Brilliance
Product: Golden Link Secondary System

Description

A vulnerability, which was classified as critical, was found in Brilliance Golden Link Secondary System up to 20250424. Affected is an unknown function of the file /paraframework/queryTsDictionaryType.htm. The manipulation of the argument dictCn1 leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/06/2025, 19:24:53 UTC

Technical Analysis

CVE-2025-4353 is a SQL Injection vulnerability identified in the Brilliance Golden Link Secondary System, specifically affecting an unknown function within the file /paraframework/queryTsDictionaryType.htm. The vulnerability arises from improper sanitization or validation of the dictCn1 parameter, which allows an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring user interaction or elevated privileges, making it accessible to unauthenticated attackers over the network. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The vector details show that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which is low but not none), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low, suggesting limited but non-negligible consequences if exploited. The vulnerability does not affect system components requiring authentication, but the presence of PR:L indicates some level of privilege is necessary, possibly a low-privileged user context. The lack of a patch link suggests that a fix may not yet be publicly available, which increases the urgency for mitigation. SQL Injection vulnerabilities can allow attackers to read, modify, or delete database contents, potentially leading to data leakage, unauthorized data manipulation, or denial of service. Given the nature of the affected system, which may be used in enterprise or industrial contexts, the impact could extend to operational disruptions or exposure of sensitive business data.

Potential Impact

For European organizations using the Brilliance Golden Link Secondary System, this vulnerability poses a risk of unauthorized database access and manipulation. The ability to remotely exploit the flaw without user interaction increases the attack surface, potentially allowing attackers to compromise data confidentiality and integrity. While the CVSS score suggests medium severity, the actual impact depends on the criticality of the data managed by the affected system. Organizations in sectors such as manufacturing, logistics, or supply chain management that rely on this system could face operational disruptions or data breaches. Additionally, the public disclosure of the vulnerability may attract attackers targeting European entities, especially if the system is integrated with other critical infrastructure. The lack of a publicly available patch means organizations must rely on compensating controls to mitigate risk, increasing operational overhead. Furthermore, compliance with European data protection regulations (e.g., GDPR) could be jeopardized if sensitive personal or business data is exposed or altered due to exploitation.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the affected system, limiting exposure to trusted internal networks or VPNs only. 2. Implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the dictCn1 parameter. 3. Conduct thorough input validation and sanitization on all parameters, especially dictCn1, to prevent injection of malicious SQL code. 4. Monitor logs for unusual database queries or errors that may indicate exploitation attempts. 5. If possible, disable or restrict access to the vulnerable endpoint (/paraframework/queryTsDictionaryType.htm) until a patch is available. 6. Engage with the vendor Brilliance for timely updates or patches and apply them promptly once released. 7. Perform regular security assessments and penetration testing focused on injection vulnerabilities in the affected system. 8. Educate system administrators and security teams about the vulnerability and signs of exploitation to enable rapid detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-05T17:04:12.501Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdaac0

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/6/2025, 7:24:53 PM

Last updated: 8/10/2025, 1:52:48 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats