Skip to main content

CVE-2025-46154: n/a

High
VulnerabilityCVE-2025-46154cvecve-2025-46154
Published: Tue Jun 03 2025 (06/03/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Foxcms v1.25 has a SQL time injection in the $_POST['dbname'] parameter of installdb.php.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:03:47 UTC

Technical Analysis

CVE-2025-46154 is a high-severity SQL injection vulnerability identified in Foxcms version 1.25, specifically within the installdb.php script. The vulnerability arises from improper sanitization of the $_POST['dbname'] parameter, which allows an attacker to inject malicious SQL code. This type of injection is classified under CWE-89, indicating that the application fails to properly neutralize special elements in SQL commands. The vulnerability is exploitable without authentication (PR:N) and requires no user interaction (UI:N), but it is limited to local access (AV:L), meaning the attacker must have local access or the ability to send requests from the local network or system. The impact is critical as it affects confidentiality, integrity, and availability (C:H/I:H/A:H) of the database and potentially the entire system. Exploiting this vulnerability could allow an attacker to execute arbitrary SQL commands, leading to unauthorized data access, data modification, or complete system compromise. Although no known exploits are reported in the wild yet, the high CVSS score of 8.4 reflects the serious risk posed by this flaw. The lack of available patches at the time of publication increases the urgency for mitigation. Given that Foxcms is a content management system, this vulnerability could be leveraged to compromise websites or web applications relying on it, potentially leading to data breaches or service disruptions.

Potential Impact

For European organizations using Foxcms v1.25, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive data, including personal information protected under GDPR, resulting in legal and financial repercussions. The integrity of website content and backend databases could be compromised, affecting business operations and customer trust. Availability impacts could cause website downtime, harming reputation and revenue. Organizations in sectors such as government, finance, healthcare, and e-commerce, which often rely on CMS platforms for their web presence, are particularly vulnerable. The local access vector suggests that internal threats or attackers who gain initial footholds within the network could escalate their privileges or move laterally using this vulnerability. The absence of known exploits currently provides a window for proactive defense, but the high severity demands immediate attention to prevent potential exploitation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are running Foxcms version 1.25 and specifically use the installdb.php script. Immediate steps include restricting access to the installdb.php file to trusted administrators only, ideally through network segmentation and access control lists. Implementing Web Application Firewalls (WAF) with custom rules to detect and block SQL injection patterns targeting the 'dbname' parameter can provide additional protection. Since no official patches are available yet, organizations should consider applying manual input validation and sanitization on the 'dbname' parameter, employing parameterized queries or prepared statements if possible. Monitoring logs for unusual POST requests to installdb.php can help detect attempted exploitation. Additionally, conducting internal audits to identify any unauthorized changes or data exfiltration is recommended. Organizations should stay alert for vendor updates or patches and plan for prompt application once released. Finally, educating internal teams about the risks of local access vulnerabilities and enforcing strict user privilege management will reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683eff8d182aa0cae27db82d

Added to database: 6/3/2025, 1:58:37 PM

Last enriched: 7/11/2025, 7:03:47 AM

Last updated: 8/1/2025, 7:58:28 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats