Skip to main content

CVE-2025-55849: n/a

High
VulnerabilityCVE-2025-55849cvecve-2025-55849
Published: Mon Sep 08 2025 (09/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

WeiPHP v5.0 and before is vulnerable to SQL Injection via the SucaiController.class.php file and the cancelTemplatee

AI-Powered Analysis

AILast updated: 09/08/2025, 19:31:22 UTC

Technical Analysis

CVE-2025-55849 is a SQL Injection vulnerability identified in WeiPHP version 5.0 and earlier. The vulnerability exists specifically in the SucaiController.class.php file, within the cancelTemplatee functionality. SQL Injection vulnerabilities occur when untrusted input is improperly sanitized and directly incorporated into SQL queries, allowing an attacker to manipulate the database queries executed by the application. In this case, an attacker could craft malicious input to the cancelTemplatee function, potentially enabling unauthorized access to or modification of the underlying database. This could lead to unauthorized data disclosure, data corruption, or even full system compromise depending on the privileges of the database user. The vulnerability is notable because WeiPHP is a PHP-based web application framework used to build dynamic websites and applications. Exploiting this vulnerability does not require authentication or user interaction, increasing its risk profile. Although no known exploits are currently reported in the wild, the lack of a patch or mitigation guidance at the time of publication (September 2025) means that systems running vulnerable versions remain at risk. The absence of a CVSS score limits precise severity quantification, but the nature of SQL Injection vulnerabilities generally implies a high risk due to their potential impact and ease of exploitation.

Potential Impact

For European organizations using WeiPHP v5.0 or earlier, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their web applications and associated data. Successful exploitation could lead to unauthorized data access, including sensitive customer or business information, which may result in regulatory non-compliance under GDPR and other data protection laws. Data integrity could be compromised through unauthorized modification or deletion of records, potentially disrupting business operations. Additionally, attackers could leverage the vulnerability to escalate privileges or deploy further malware, leading to broader network compromise. The impact is particularly critical for sectors such as finance, healthcare, and government where data sensitivity and regulatory requirements are stringent. The lack of known exploits currently may provide a window for remediation, but the vulnerability’s presence in a web-facing component increases exposure to automated scanning and exploitation attempts by threat actors.

Mitigation Recommendations

European organizations should immediately audit their web applications to identify any usage of WeiPHP version 5.0 or earlier. If found, upgrading to a patched or newer version of WeiPHP that addresses this vulnerability is the most effective mitigation. In the absence of an official patch, organizations should implement strict input validation and sanitization on all user inputs, especially those interacting with the cancelTemplatee function or related database queries. Employing parameterized queries or prepared statements can prevent SQL Injection by separating code from data. Web Application Firewalls (WAFs) should be configured to detect and block SQL Injection patterns targeting the vulnerable endpoint. Additionally, conducting regular security assessments and penetration testing focused on injection flaws can help identify residual risks. Monitoring application logs for suspicious database query patterns or errors can provide early detection of exploitation attempts. Finally, organizations should ensure that database accounts used by the application have the minimum necessary privileges to limit the impact of a successful injection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68bf2ba8d5a2966cfc829765

Added to database: 9/8/2025, 7:16:56 PM

Last enriched: 9/8/2025, 7:31:22 PM

Last updated: 9/9/2025, 9:12:27 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats