CVE-2025-6005: SQL Injection in kiCode111 like-girl
A vulnerability classified as critical was found in kiCode111 like-girl 5.2.0. This vulnerability affects unknown code of the file /admin/aboutPost.php. The manipulation of the argument title/aboutimg/info1/info2/info3/btn1/btn2/infox1/infox2/infox3/infox4/infox5/infox6/btnx2/infof1/infof2/infof3/infof4/btnf3/infod1/infod2/infod3/infod4/infod5 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-6005 is a SQL Injection vulnerability identified in kiCode111's product "like-girl" version 5.2.0, specifically within the /admin/aboutPost.php file. The vulnerability arises from improper sanitization or validation of multiple input parameters including title, aboutimg, info1 through info6, btn1, btn2, infox1 through infox6, btnx2, infof1 through infof4, btnf3, and infod1 through infod5. An attacker can remotely manipulate these parameters to inject malicious SQL code, potentially altering the backend database queries executed by the application. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. Despite the critical classification, the CVSS 4.0 score is 5.1 (medium severity) due to the presence of high privileges required (PR:H) and limited impact on confidentiality, integrity, and availability (all low). The vendor has not responded to disclosure attempts, and no patches or mitigations have been published. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability affects only version 5.2.0 of the product, and the lack of vendor response suggests that organizations using this version remain exposed. The attack surface is broad given the numerous parameters vulnerable to injection, increasing the likelihood of successful exploitation if the application is internet-facing or accessible by untrusted users.
Potential Impact
For European organizations using kiCode111 like-girl 5.2.0, this vulnerability poses a risk of unauthorized database access or manipulation. Successful exploitation could lead to data leakage, unauthorized data modification, or disruption of application functionality. Although the CVSS score is medium, the fact that exploitation requires high privileges limits the attacker's initial access vector, potentially reducing the risk to internal or less exposed systems. However, if an attacker gains administrative access or if the application is misconfigured to allow broader access, the impact could escalate. Data confidentiality and integrity could be compromised, affecting sensitive business or customer information. Availability impact is low but could occur if injected queries cause application errors or crashes. The lack of vendor patching means organizations must rely on compensating controls. Given the public disclosure, European entities in sectors with high regulatory requirements (e.g., finance, healthcare) could face compliance risks if data breaches occur. Additionally, organizations with internet-facing administrative interfaces are at higher risk of remote exploitation.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /admin/aboutPost.php endpoint to trusted internal networks or VPN users only, minimizing exposure to untrusted actors. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns on the affected parameters to block malicious payloads. 3. Conduct thorough input validation and sanitization on all parameters listed, using parameterized queries or prepared statements to prevent injection. 4. If possible, upgrade to a newer, patched version of like-girl once available or consider alternative products if vendor support is discontinued. 5. Monitor application logs for unusual database query patterns or errors indicative of injection attempts. 6. Employ network segmentation to isolate administrative interfaces from general user access. 7. Regularly back up databases to enable recovery in case of data corruption or loss. 8. Engage in proactive threat hunting and vulnerability scanning focused on this CVE to detect exploitation attempts early. 9. If vendor patches remain unavailable, consider code review and custom patching by internal security teams or third-party experts to remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6005: SQL Injection in kiCode111 like-girl
Description
A vulnerability classified as critical was found in kiCode111 like-girl 5.2.0. This vulnerability affects unknown code of the file /admin/aboutPost.php. The manipulation of the argument title/aboutimg/info1/info2/info3/btn1/btn2/infox1/infox2/infox3/infox4/infox5/infox6/btnx2/infof1/infof2/infof3/infof4/btnf3/infod1/infod2/infod3/infod4/infod5 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-6005 is a SQL Injection vulnerability identified in kiCode111's product "like-girl" version 5.2.0, specifically within the /admin/aboutPost.php file. The vulnerability arises from improper sanitization or validation of multiple input parameters including title, aboutimg, info1 through info6, btn1, btn2, infox1 through infox6, btnx2, infof1 through infof4, btnf3, and infod1 through infod5. An attacker can remotely manipulate these parameters to inject malicious SQL code, potentially altering the backend database queries executed by the application. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. Despite the critical classification, the CVSS 4.0 score is 5.1 (medium severity) due to the presence of high privileges required (PR:H) and limited impact on confidentiality, integrity, and availability (all low). The vendor has not responded to disclosure attempts, and no patches or mitigations have been published. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability affects only version 5.2.0 of the product, and the lack of vendor response suggests that organizations using this version remain exposed. The attack surface is broad given the numerous parameters vulnerable to injection, increasing the likelihood of successful exploitation if the application is internet-facing or accessible by untrusted users.
Potential Impact
For European organizations using kiCode111 like-girl 5.2.0, this vulnerability poses a risk of unauthorized database access or manipulation. Successful exploitation could lead to data leakage, unauthorized data modification, or disruption of application functionality. Although the CVSS score is medium, the fact that exploitation requires high privileges limits the attacker's initial access vector, potentially reducing the risk to internal or less exposed systems. However, if an attacker gains administrative access or if the application is misconfigured to allow broader access, the impact could escalate. Data confidentiality and integrity could be compromised, affecting sensitive business or customer information. Availability impact is low but could occur if injected queries cause application errors or crashes. The lack of vendor patching means organizations must rely on compensating controls. Given the public disclosure, European entities in sectors with high regulatory requirements (e.g., finance, healthcare) could face compliance risks if data breaches occur. Additionally, organizations with internet-facing administrative interfaces are at higher risk of remote exploitation.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the /admin/aboutPost.php endpoint to trusted internal networks or VPN users only, minimizing exposure to untrusted actors. 2. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns on the affected parameters to block malicious payloads. 3. Conduct thorough input validation and sanitization on all parameters listed, using parameterized queries or prepared statements to prevent injection. 4. If possible, upgrade to a newer, patched version of like-girl once available or consider alternative products if vendor support is discontinued. 5. Monitor application logs for unusual database query patterns or errors indicative of injection attempts. 6. Employ network segmentation to isolate administrative interfaces from general user access. 7. Regularly back up databases to enable recovery in case of data corruption or loss. 8. Engage in proactive threat hunting and vulnerability scanning focused on this CVE to detect exploitation attempts early. 9. If vendor patches remain unavailable, consider code review and custom patching by internal security teams or third-party experts to remediate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-11T18:52:49.264Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684a2c11358c65714e69e357
Added to database: 6/12/2025, 1:23:29 AM
Last enriched: 6/12/2025, 1:38:48 AM
Last updated: 8/18/2025, 11:28:37 PM
Views: 17
Related Threats
CVE-2025-9134: Improper Export of Android Application Components in AfterShip Package Tracker App
MediumCVE-2025-4690: CWE-1333 Inefficient Regular Expression Complexity in Google AngularJS
MediumCVE-2025-4046: CWE-862 Missing Authorization in Lexmark Lexmark Cloud Services
HighCVE-2025-4044: CWE-611 Improper Restriction of XML External Entity Reference in Lexmark Universal Print Driver
HighCVE-2025-9139: Information Disclosure in Scada-LTS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.