Skip to main content

CVE-2025-5386: SQL Injection in JeeWMS

Medium
VulnerabilityCVE-2025-5386cvecve-2025-5386
Published: Sat May 31 2025 (05/31/2025, 17:00:07 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: JeeWMS

Description

A vulnerability was found in JeeWMS up to 20250504. It has been rated as critical. This issue affects the function transEditor of the file /cgformTransController.do?transEditor. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

AILast updated: 07/09/2025, 00:55:25 UTC

Technical Analysis

CVE-2025-5386 is a SQL Injection vulnerability identified in JeeWMS, specifically affecting the transEditor function within the /cgformTransController.do?transEditor endpoint. The vulnerability exists in JeeWMS versions up to 20250504, with no clear versioning system to distinguish affected from unaffected releases. The flaw allows an attacker to remotely manipulate SQL queries by injecting malicious input into the transEditor function, potentially leading to unauthorized data access or modification. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges required), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Despite the CVSS score of 5.3 and medium severity rating, the vulnerability's critical nature is underscored by the potential for unauthorized data manipulation via SQL injection, a common and dangerous web application flaw. No known exploits are currently reported in the wild, and no patches or vendor advisories are available, complicating immediate remediation efforts.

Potential Impact

For European organizations using JeeWMS, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their data. SQL injection can allow attackers to extract sensitive information, alter or delete data, or escalate privileges within the application database. Given that JeeWMS is a warehouse management system, compromised data could disrupt supply chain operations, inventory management, and logistics, leading to operational downtime and financial losses. The medium CVSS score suggests limited impact per the vector metrics, but the real-world impact could be more severe if attackers leverage the vulnerability to pivot into broader network compromise. The lack of versioning and patches increases the risk of prolonged exposure. European organizations with critical supply chain dependencies on JeeWMS may face regulatory compliance issues, especially under GDPR, if personal or sensitive data is exposed or manipulated.

Mitigation Recommendations

Organizations should immediately conduct an inventory to identify any deployments of JeeWMS, particularly versions up to 20250504. Given the absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the transEditor endpoint. Input validation and parameterized queries should be enforced if source code access is available, or consider disabling or restricting access to the vulnerable transEditor function until a patch is released. Network segmentation and strict access controls limiting who can reach the JeeWMS application will reduce exposure. Continuous monitoring for unusual database queries or application behavior is critical. Organizations should engage with the vendor or community for updates and consider alternative solutions if remediation is delayed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-30T12:46:33.747Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683b38a5182aa0cae2eaed31

Added to database: 5/31/2025, 5:13:09 PM

Last enriched: 7/9/2025, 12:55:25 AM

Last updated: 8/12/2025, 6:22:07 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats