Skip to main content

CVE-2025-6267: SQL Injection in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台

Medium
VulnerabilityCVE-2025-6267cvecve-2025-6267
Published: Thu Jun 19 2025 (06/19/2025, 14:00:15 UTC)
Source: CVE Database V5
Vendor/Project: zhilink 智互联(深圳)科技有限公司
Product: ADP Application Developer Platform 应用开发者平台

Description

A vulnerability was found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /adpweb/a/base/barcodeDetail/. The manipulation of the argument barcodeNo/barcode/itemNo leads to sql injection. The attack may be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 06/19/2025, 14:31:37 UTC

Technical Analysis

CVE-2025-6267 is a SQL Injection vulnerability identified in version 1.0.0 of the ADP Application Developer Platform (应用开发者平台) developed by zhilink 智互联(深圳)科技有限公司. The vulnerability arises from improper input validation and sanitization in the processing of HTTP requests targeting the endpoint /adpweb/a/base/barcodeDetail/. Specifically, the parameters barcodeNo, barcode, and itemNo are susceptible to malicious input that can manipulate the underlying SQL queries executed by the application. This flaw allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion within the backend database. The vulnerability does not require user interaction and can be exploited over the network without prior authentication, increasing its risk profile. However, the CVSS 4.0 score assigned is 5.3 (medium severity), reflecting some mitigating factors such as limited scope of impact on confidentiality, integrity, and availability (all rated low), and the requirement of low privileges (PR:L) rather than no privileges. The vendor has not responded to disclosure attempts, and no patches or known exploits are currently reported in the wild. The lack of vendor response and absence of mitigations increases the risk for organizations relying on this platform, especially if exposed to untrusted networks.

Potential Impact

For European organizations using the ADP Application Developer Platform 1.0.0 by zhilink, this vulnerability poses a risk of unauthorized database access and manipulation. Potential impacts include leakage of sensitive business or user data, corruption or deletion of critical application data, and disruption of application functionality. Given the platform’s role as an application development environment, exploitation could also lead to compromise of applications built on top of it, further expanding the attack surface. The medium CVSS rating suggests that while the impact on confidentiality, integrity, and availability is limited, the ease of remote exploitation without user interaction or authentication makes it a significant concern. Organizations in Europe that integrate this platform into their development or production environments may face compliance risks under GDPR if personal data is exposed. Additionally, the absence of vendor patches means organizations must rely on internal mitigations, increasing operational overhead and risk of exploitation.

Mitigation Recommendations

1. Immediate network-level controls: Restrict access to the /adpweb/a/base/barcodeDetail/ endpoint using firewalls or web application firewalls (WAFs) to allow only trusted IP addresses or internal networks. 2. Input validation and sanitization: Implement strict input validation on the parameters barcodeNo, barcode, and itemNo at the application or proxy level to reject or sanitize suspicious inputs that could contain SQL syntax. 3. Use parameterized queries or prepared statements: If possible, review and update the application code to employ parameterized queries to prevent SQL injection. 4. Monitor and log: Enable detailed logging and monitoring of requests to the vulnerable endpoint to detect anomalous or suspicious activity indicative of exploitation attempts. 5. Segmentation: Isolate the ADP platform and its database from critical production systems to limit potential lateral movement in case of compromise. 6. Vendor engagement: Continue efforts to engage the vendor for official patches or updates; consider alternative platforms if no remediation is forthcoming. 7. Incident response readiness: Prepare incident response plans specifically addressing SQL injection attacks and potential data breaches related to this platform. 8. Regular security assessments: Conduct penetration testing and code reviews focusing on injection flaws in the platform and associated applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T06:05:46.624Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68541bce33c7acc0460ac8b1

Added to database: 6/19/2025, 2:16:46 PM

Last enriched: 6/19/2025, 2:31:37 PM

Last updated: 8/11/2025, 11:48:20 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats