Skip to main content

CVE-2025-4795: SQL Injection in gongfuxiang schoolcms

Medium
VulnerabilityCVE-2025-4795cvecve-2025-4795
Published: Fri May 16 2025 (05/16/2025, 18:31:04 UTC)
Source: CVE
Vendor/Project: gongfuxiang
Product: schoolcms

Description

A vulnerability classified as critical has been found in gongfuxiang schoolcms 2.3.1. This affects the function SaveInfo of the file /index.php?m=Admin&c=article&a=SaveInfo. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 21:46:37 UTC

Technical Analysis

CVE-2025-4795 is a SQL Injection vulnerability identified in gongfuxiang schoolcms version 2.3.1, specifically affecting the SaveInfo function within the /index.php?m=Admin&c=article&a=SaveInfo endpoint. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which allows an attacker to inject malicious SQL code remotely. Exploiting this flaw can enable unauthorized access to the backend database, potentially leading to unauthorized data disclosure, data manipulation, or even complete compromise of the application’s data integrity. The vulnerability does not require user interaction but does require high privileges (PR:H) according to the CVSS vector, indicating that an attacker must have some level of authenticated access to exploit it. The CVSS 4.0 score is 5.1, categorized as medium severity, reflecting limited impact on confidentiality, integrity, and availability, and a relatively constrained scope of exploitation. No public exploits are currently known in the wild, and no patches have been officially released yet. The vulnerability is critical in nature due to the SQL injection vector, but the requirement for high privileges and the limited impact reduce the overall severity rating. Given the nature of schoolcms as a content management system for educational institutions, exploitation could lead to unauthorized access to sensitive student or administrative data, defacement of content, or disruption of educational services.

Potential Impact

For European organizations, particularly educational institutions using gongfuxiang schoolcms 2.3.1, this vulnerability poses a risk of unauthorized database access and potential data breaches involving sensitive student and staff information. The compromise of such data could lead to violations of GDPR and other data protection regulations, resulting in legal and financial repercussions. Additionally, manipulation or deletion of educational content could disrupt academic operations and damage institutional reputation. Since the exploit requires authenticated high privileges, insider threats or compromised administrative accounts represent the primary risk vectors. The medium severity rating suggests that while the vulnerability is serious, it is not trivially exploitable by external unauthenticated attackers, somewhat limiting its immediate impact. However, the public disclosure of the vulnerability increases the risk of targeted attacks, especially if patches or mitigations are not promptly applied.

Mitigation Recommendations

1. Immediate review and restriction of administrative access to the schoolcms system to trusted personnel only, minimizing the risk of privilege abuse. 2. Implement strict input validation and parameterized queries in the SaveInfo function to prevent SQL injection, ideally by applying official patches once released by the vendor. 3. Monitor and audit logs for unusual activity related to article management functions, particularly any suspicious manipulation of the 'ID' parameter. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. 5. Conduct regular security assessments and penetration tests focusing on authentication mechanisms and input handling in schoolcms. 6. Educate administrative users about phishing and credential security to prevent account compromise. 7. If patching is delayed, consider isolating the affected application from external networks or restricting access via VPN or IP whitelisting to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-15T16:13:58.613Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba9f

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 9:46:37 PM

Last updated: 7/31/2025, 4:11:38 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats