Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56556: n/a

0
Low
VulnerabilityCVE-2025-56556cvecve-2025-56556
Published: Thu Sep 11 2025 (09/11/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-56556 is a vulnerability in Subrion CMS 4. 2. 1 that allows authenticated administrators or moderators with access to the built-in Run SQL Query feature to escalate privileges within the SQL query tool context. The flaw requires authenticated access with high privileges but does not require user interaction. The vulnerability impacts confidentiality and integrity but not availability, with a CVSS score of 3. 8 indicating low severity. No known exploits are currently reported in the wild. European organizations using Subrion CMS 4. 2. 1, especially those with multiple admin or moderator roles, should be aware of this risk.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:53:58 UTC

Technical Analysis

CVE-2025-56556 is a vulnerability identified in Subrion CMS version 4.2.1 that affects the built-in Run SQL Query feature accessible via the SQL Tool admin panel. The vulnerability allows authenticated users with administrator or moderator roles—who already have access to this feature—to escalate their privileges within the context of the SQL query tool. This means that these users can perform actions beyond their intended scope, potentially manipulating the database in unauthorized ways. The vulnerability is classified under CWE-566, which relates to authorization issues, indicating improper privilege management. The CVSS v3.1 score is 3.8 (low severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N, meaning the attack can be performed remotely over the network, requires low attack complexity, but high privileges, no user interaction, and impacts confidentiality and integrity slightly without affecting availability. No patches or known exploits are currently reported, but the vulnerability is published and should be considered for remediation. The lack of a patch link suggests that a fix may not yet be available, so organizations must rely on access control and monitoring as interim measures.

Potential Impact

For European organizations using Subrion CMS 4.2.1, this vulnerability poses a risk of privilege escalation for users who already have elevated roles such as administrators or moderators. While the initial access requires high privileges, the flaw could allow these users to perform unauthorized SQL queries that may lead to unauthorized data access or modification, impacting data confidentiality and integrity. This could be particularly damaging for organizations handling sensitive personal data under GDPR, as unauthorized data manipulation or leakage could lead to compliance violations and reputational damage. Although availability is not impacted, the integrity compromise could affect business operations relying on accurate database information. The risk is mitigated by the requirement for authenticated access, but insider threats or compromised accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the potential for future exploitation.

Mitigation Recommendations

1. Restrict access to the SQL Tool admin panel strictly to trusted administrators and minimize the number of users with access to the Run SQL Query feature. 2. Implement strong authentication and authorization controls, including multi-factor authentication for admin and moderator accounts. 3. Regularly audit user roles and permissions to ensure that only necessary privileges are assigned. 4. Monitor and log all SQL queries executed via the admin panel to detect suspicious or unauthorized activities promptly. 5. Apply vendor patches or updates as soon as they become available to address this vulnerability directly. 6. Consider isolating the CMS environment and database access to reduce the blast radius in case of exploitation. 7. Educate administrators and moderators about the risks of misuse of the SQL query feature and enforce strict operational procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c31ac15fe4190550a2ff4e

Added to database: 9/11/2025, 6:53:53 PM

Last enriched: 12/2/2025, 2:53:58 PM

Last updated: 12/13/2025, 11:55:53 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats