Skip to main content

CVE-2025-6007: SQL Injection in kiCode111 like-girl

Medium
VulnerabilityCVE-2025-6007cvecve-2025-6007
Published: Thu Jun 12 2025 (06/12/2025, 02:00:18 UTC)
Source: CVE Database V5
Vendor/Project: kiCode111
Product: like-girl

Description

A vulnerability, which was classified as critical, was found in kiCode111 like-girl 5.2.0. Affected is an unknown function of the file /admin/CopyadminPost.php. The manipulation of the argument icp/Copyright leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 06/12/2025, 02:23:54 UTC

Technical Analysis

CVE-2025-6007 is a SQL Injection vulnerability identified in version 5.2.0 of the kiCode111 like-girl web application, specifically within an unspecified function in the /admin/CopyadminPost.php file. The vulnerability arises from improper sanitization or validation of the 'icp/Copyright' parameter, which can be manipulated by an attacker to inject malicious SQL commands. This flaw allows remote attackers to execute arbitrary SQL queries on the backend database without requiring authentication or user interaction. Although the vendor was notified early, no response or patch has been issued, and while no known exploits are currently observed in the wild, the exploit code has been publicly disclosed. The vulnerability has been assigned a CVSS v4.0 base score of 5.1, categorized as medium severity, reflecting a network attack vector with low complexity and no required privileges or user interaction. The impact on confidentiality, integrity, and availability is rated low, indicating limited potential for severe damage or data leakage under typical conditions. However, the presence of a SQL Injection in an administrative endpoint suggests potential for unauthorized data access or modification if exploited effectively. The lack of vendor response and patch availability increases the risk for organizations using this specific version of the product.

Potential Impact

For European organizations using kiCode111 like-girl version 5.2.0, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of their data. Exploitation could allow attackers to extract sensitive information, modify or delete data, or potentially escalate privileges within the application’s database. Given the vulnerability is remotely exploitable without authentication, attackers could target exposed administrative interfaces, leading to unauthorized access to backend systems. The impact is somewhat mitigated by the low CVSS score, indicating limited scope and impact; however, organizations with critical data or regulatory compliance requirements (e.g., GDPR) could face significant legal and reputational consequences if data is compromised. Additionally, the lack of vendor remediation increases exposure time. The threat is particularly relevant for sectors relying on this software for administrative or content management functions, including SMEs and niche service providers in Europe. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks, especially given public exploit disclosure.

Mitigation Recommendations

1. Immediate mitigation should involve restricting access to the /admin/CopyadminPost.php endpoint via network controls such as IP whitelisting, VPN-only access, or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'icp/Copyright' parameter. 2. Conduct thorough input validation and sanitization on all parameters, especially those used in SQL queries, employing parameterized queries or prepared statements to prevent injection. 3. Monitor application logs and database query logs for unusual or suspicious activity indicative of SQL injection attempts. 4. If possible, upgrade to a later, patched version of like-girl once available or apply vendor-provided patches promptly. 5. In the absence of vendor patches, consider isolating the affected application in a segmented network zone to limit potential lateral movement. 6. Perform regular security assessments and penetration testing focused on injection vulnerabilities. 7. Educate administrators and developers about secure coding practices and the risks of SQL injection. 8. Implement database-level restrictions such as least privilege for the application database user to minimize damage from potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-11T18:52:59.080Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684a369d358c65714e69ea9e

Added to database: 6/12/2025, 2:08:29 AM

Last enriched: 6/12/2025, 2:23:54 AM

Last updated: 8/19/2025, 1:21:46 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats