CVE-2025-5170: SQL Injection in llisoft MTA Maita Training System

Medium
VulnerabilityCVE-2025-5170cvecve-2025-5170
Published: Mon May 26 2025 (05/26/2025, 05:00:10 UTC)
Source: CVE
Vendor/Project: llisoft
Product: MTA Maita Training System

Description

A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\llisoft\controller\admin\shiti\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 06/09/2025, 13:05:55 UTC

Technical Analysis

CVE-2025-5170 is a SQL Injection vulnerability identified in version 4.5 of the llisoft MTA Maita Training System, specifically within the AdminShitiListRequestVo function of the AdminShitiController.java file. The vulnerability arises from improper sanitization or validation of the 'stTypeIds' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. The vulnerability is remotely exploitable without user interaction and does not require prior authentication, increasing its risk profile. Although the CVSS 4.0 score is 5.3 (medium severity), the injection vector can lead to unauthorized data access, data modification, or disruption of service depending on the database privileges and query context. The vendor has not responded to disclosure attempts, and no patches or mitigations have been published. No known exploits are currently reported in the wild, but public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability impacts confidentiality, integrity, and availability to varying degrees, with the potential for data leakage or corruption. The affected product is a training management system, which may contain sensitive organizational or personal data, making the impact significant in environments where this software is deployed.

Potential Impact

For European organizations using llisoft MTA Maita Training System 4.5, this vulnerability poses a risk of unauthorized access to sensitive training data, potentially including personal information of employees or trainees. Exploitation could lead to data breaches, manipulation of training records, or denial of service if the database is corrupted or queries are disrupted. Given the remote and unauthenticated nature of the attack, threat actors could leverage this vulnerability to gain footholds within organizational networks or exfiltrate data without detection. The lack of vendor response and absence of patches exacerbate the risk, as organizations must rely on compensating controls. The impact is particularly critical for sectors with strict data protection regulations such as GDPR, where exposure of personal data could lead to regulatory penalties and reputational damage. Additionally, training systems often integrate with broader HR or compliance systems, so compromise could cascade to other critical business functions.

Mitigation Recommendations

Since no official patch or vendor guidance is available, European organizations should implement the following specific mitigations: 1) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'stTypeIds' parameter, including payloads with SQL keywords or special characters. 2) Conduct immediate code audits and apply input validation and parameterized queries or prepared statements in the affected function if source code access is available. 3) Restrict database user privileges for the application to the minimum necessary, preventing unauthorized data modification or retrieval beyond the application's scope. 4) Monitor application and database logs for anomalous query patterns or repeated failed attempts that may indicate exploitation attempts. 5) Isolate the training system network segment and limit external access to reduce exposure. 6) Consider temporary disabling or restricting access to the vulnerable functionality until a patch or vendor fix is released. 7) Educate internal security teams about this vulnerability to enhance incident detection and response capabilities. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and the operational context of the affected system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-25T13:23:53.823Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6833f6f70acd01a249283d96

Added to database: 5/26/2025, 5:07:03 AM

Last enriched: 6/9/2025, 1:05:55 PM

Last updated: 6/15/2025, 7:28:16 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats