CVE-2025-5170: SQL Injection in llisoft MTA Maita Training System
A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\llisoft\controller\admin\shiti\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5170 is a SQL Injection vulnerability identified in version 4.5 of the llisoft MTA Maita Training System, specifically within the AdminShitiListRequestVo function of the AdminShitiController.java file. The vulnerability arises due to improper sanitization or validation of the 'stTypeIds' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the database queries executed by the application. The vulnerability is remotely exploitable without user interaction and does not require elevated privileges, increasing its risk profile. Although the CVSS 4.0 base score is 5.3 (medium severity), the vulnerability impacts confidentiality, integrity, and availability to a limited extent, as indicated by the low to medium impact metrics. The vendor has not responded to the disclosure, and no patches or mitigations have been publicly released. No known exploits are currently observed in the wild, but the public disclosure of the exploit code increases the risk of exploitation by threat actors.
Potential Impact
For European organizations using the llisoft MTA Maita Training System 4.5, this vulnerability could lead to unauthorized access or manipulation of sensitive training data stored within the system's database. Attackers could extract confidential information, alter training content, or disrupt system availability by executing arbitrary SQL commands. This could undermine the integrity of training records, compliance reporting, and operational continuity. Given that the vulnerability does not require authentication or user interaction, attackers can remotely exploit it with relative ease, increasing the risk of widespread compromise. Organizations in sectors such as education, corporate training, and government agencies relying on this system may face data breaches, reputational damage, and regulatory penalties under GDPR if personal data is exposed or altered.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. These include deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'stTypeIds' parameter. Input validation and sanitization should be enforced at the application layer, ideally by restricting input formats and employing parameterized queries or prepared statements if source code access is possible. Network segmentation can limit exposure of the vulnerable system to only trusted internal users. Additionally, organizations should monitor logs for suspicious database query patterns and unusual application behavior indicative of exploitation attempts. Engaging with the vendor for updates and planning for an upgrade or replacement of the affected system is critical. Regular backups of the database should be maintained to enable recovery in case of data tampering.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5170: SQL Injection in llisoft MTA Maita Training System
Description
A vulnerability classified as critical was found in llisoft MTA Maita Training System 4.5. This vulnerability affects the function AdminShitiListRequestVo of the file com\llisoft\controller\admin\shiti\AdminShitiController.java. The manipulation of the argument stTypeIds leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5170 is a SQL Injection vulnerability identified in version 4.5 of the llisoft MTA Maita Training System, specifically within the AdminShitiListRequestVo function of the AdminShitiController.java file. The vulnerability arises due to improper sanitization or validation of the 'stTypeIds' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the database queries executed by the application. The vulnerability is remotely exploitable without user interaction and does not require elevated privileges, increasing its risk profile. Although the CVSS 4.0 base score is 5.3 (medium severity), the vulnerability impacts confidentiality, integrity, and availability to a limited extent, as indicated by the low to medium impact metrics. The vendor has not responded to the disclosure, and no patches or mitigations have been publicly released. No known exploits are currently observed in the wild, but the public disclosure of the exploit code increases the risk of exploitation by threat actors.
Potential Impact
For European organizations using the llisoft MTA Maita Training System 4.5, this vulnerability could lead to unauthorized access or manipulation of sensitive training data stored within the system's database. Attackers could extract confidential information, alter training content, or disrupt system availability by executing arbitrary SQL commands. This could undermine the integrity of training records, compliance reporting, and operational continuity. Given that the vulnerability does not require authentication or user interaction, attackers can remotely exploit it with relative ease, increasing the risk of widespread compromise. Organizations in sectors such as education, corporate training, and government agencies relying on this system may face data breaches, reputational damage, and regulatory penalties under GDPR if personal data is exposed or altered.
Mitigation Recommendations
Since no official patch is available, European organizations should implement immediate compensating controls. These include deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'stTypeIds' parameter. Input validation and sanitization should be enforced at the application layer, ideally by restricting input formats and employing parameterized queries or prepared statements if source code access is possible. Network segmentation can limit exposure of the vulnerable system to only trusted internal users. Additionally, organizations should monitor logs for suspicious database query patterns and unusual application behavior indicative of exploitation attempts. Engaging with the vendor for updates and planning for an upgrade or replacement of the affected system is critical. Regular backups of the database should be maintained to enable recovery in case of data tampering.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-25T13:23:53.823Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6833f6f70acd01a249283d96
Added to database: 5/26/2025, 5:07:03 AM
Last enriched: 7/9/2025, 1:42:16 PM
Last updated: 8/18/2025, 11:34:24 PM
Views: 31
Related Threats
CVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
HighCVE-2025-52450: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server
HighCVE-2025-26498: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
CriticalCVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.