CVE-2025-5170: SQL Injection in llisoft MTA Maita Training System
A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\llisoft\controller\admin\shiti\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5170 is a SQL Injection vulnerability identified in version 4.5 of the llisoft MTA Maita Training System, specifically within the AdminShitiListRequestVo function of the AdminShitiController.java file. The vulnerability arises from improper sanitization or validation of the 'stTypeIds' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. The vulnerability is remotely exploitable without user interaction and does not require prior authentication, increasing its risk profile. Although the CVSS 4.0 score is 5.3 (medium severity), the injection vector can lead to unauthorized data access, data modification, or disruption of service depending on the database privileges and query context. The vendor has not responded to disclosure attempts, and no patches or mitigations have been published. No known exploits are currently reported in the wild, but public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability impacts confidentiality, integrity, and availability to varying degrees, with the potential for data leakage or corruption. The affected product is a training management system, which may contain sensitive organizational or personal data, making the impact significant in environments where this software is deployed.
Potential Impact
For European organizations using llisoft MTA Maita Training System 4.5, this vulnerability poses a risk of unauthorized access to sensitive training data, potentially including personal information of employees or trainees. Exploitation could lead to data breaches, manipulation of training records, or denial of service if the database is corrupted or queries are disrupted. Given the remote and unauthenticated nature of the attack, threat actors could leverage this vulnerability to gain footholds within organizational networks or exfiltrate data without detection. The lack of vendor response and absence of patches exacerbate the risk, as organizations must rely on compensating controls. The impact is particularly critical for sectors with strict data protection regulations such as GDPR, where exposure of personal data could lead to regulatory penalties and reputational damage. Additionally, training systems often integrate with broader HR or compliance systems, so compromise could cascade to other critical business functions.
Mitigation Recommendations
Since no official patch or vendor guidance is available, European organizations should implement the following specific mitigations: 1) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'stTypeIds' parameter, including payloads with SQL keywords or special characters. 2) Conduct immediate code audits and apply input validation and parameterized queries or prepared statements in the affected function if source code access is available. 3) Restrict database user privileges for the application to the minimum necessary, preventing unauthorized data modification or retrieval beyond the application's scope. 4) Monitor application and database logs for anomalous query patterns or repeated failed attempts that may indicate exploitation attempts. 5) Isolate the training system network segment and limit external access to reduce exposure. 6) Consider temporary disabling or restricting access to the vulnerable functionality until a patch or vendor fix is released. 7) Educate internal security teams about this vulnerability to enhance incident detection and response capabilities. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and the operational context of the affected system.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-5170: SQL Injection in llisoft MTA Maita Training System
Description
A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\llisoft\controller\admin\shiti\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5170 is a SQL Injection vulnerability identified in version 4.5 of the llisoft MTA Maita Training System, specifically within the AdminShitiListRequestVo function of the AdminShitiController.java file. The vulnerability arises from improper sanitization or validation of the 'stTypeIds' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. The vulnerability is remotely exploitable without user interaction and does not require prior authentication, increasing its risk profile. Although the CVSS 4.0 score is 5.3 (medium severity), the injection vector can lead to unauthorized data access, data modification, or disruption of service depending on the database privileges and query context. The vendor has not responded to disclosure attempts, and no patches or mitigations have been published. No known exploits are currently reported in the wild, but public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability impacts confidentiality, integrity, and availability to varying degrees, with the potential for data leakage or corruption. The affected product is a training management system, which may contain sensitive organizational or personal data, making the impact significant in environments where this software is deployed.
Potential Impact
For European organizations using llisoft MTA Maita Training System 4.5, this vulnerability poses a risk of unauthorized access to sensitive training data, potentially including personal information of employees or trainees. Exploitation could lead to data breaches, manipulation of training records, or denial of service if the database is corrupted or queries are disrupted. Given the remote and unauthenticated nature of the attack, threat actors could leverage this vulnerability to gain footholds within organizational networks or exfiltrate data without detection. The lack of vendor response and absence of patches exacerbate the risk, as organizations must rely on compensating controls. The impact is particularly critical for sectors with strict data protection regulations such as GDPR, where exposure of personal data could lead to regulatory penalties and reputational damage. Additionally, training systems often integrate with broader HR or compliance systems, so compromise could cascade to other critical business functions.
Mitigation Recommendations
Since no official patch or vendor guidance is available, European organizations should implement the following specific mitigations: 1) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'stTypeIds' parameter, including payloads with SQL keywords or special characters. 2) Conduct immediate code audits and apply input validation and parameterized queries or prepared statements in the affected function if source code access is available. 3) Restrict database user privileges for the application to the minimum necessary, preventing unauthorized data modification or retrieval beyond the application's scope. 4) Monitor application and database logs for anomalous query patterns or repeated failed attempts that may indicate exploitation attempts. 5) Isolate the training system network segment and limit external access to reduce exposure. 6) Consider temporary disabling or restricting access to the vulnerable functionality until a patch or vendor fix is released. 7) Educate internal security teams about this vulnerability to enhance incident detection and response capabilities. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and the operational context of the affected system.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-25T13:23:53.823Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6833f6f70acd01a249283d96
Added to database: 5/26/2025, 5:07:03 AM
Last enriched: 6/9/2025, 1:05:55 PM
Last updated: 6/15/2025, 7:28:16 AM
Views: 9
Related Threats
CVE-2025-2814: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in LDS Crypt::CBC
MediumCVE-2025-5337: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in metaslider Slider, Gallery, and Carousel by MetaSlider – Image Slider, Video Slider
MediumCVE-2025-5238: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-4667: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
MediumCVE-2025-6070: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in josxha Restrict File Access
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.