CVE-2025-64084: n/a
An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function.
AI Analysis
Technical Summary
CVE-2025-64084 is an authenticated SQL injection vulnerability identified in Cloudlog version 2.7.5 and earlier. The root cause lies in the vucc_details_ajax function within the application/controllers/Awards.php file, where the Gridsquare POST parameter supplied by the user is not properly sanitized before being used in the vucc_qso_details function. This function concatenates the user input directly into a raw SQL query, violating secure coding practices and enabling SQL injection attacks. An attacker with valid authentication credentials but potentially low privileges can exploit this flaw to execute arbitrary SQL commands against the backend database. This could lead to unauthorized reading or modification of data, potentially compromising confidentiality and integrity of stored information. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 5.4, reflecting medium severity. The attack vector is network-based (remote), with low attack complexity and no user interface required. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without impacting other components. There are no known public exploits at this time, and no patches have been linked yet, indicating organizations should monitor for updates and consider interim mitigations. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and well-understood injection flaw.
Potential Impact
For European organizations using Cloudlog, especially amateur radio clubs, hobbyists, or institutions relying on this software for logging and awards management, this vulnerability poses a risk of unauthorized data access and manipulation. The SQL injection could allow attackers to extract sensitive user data, alter records, or corrupt the database, undermining data integrity and confidentiality. While availability impact is not indicated, the integrity and confidentiality breaches could lead to loss of trust, reputational damage, and potential regulatory compliance issues under GDPR if personal data is involved. The requirement for authentication limits the attack surface but does not eliminate risk, particularly if credentials are weak or compromised. Organizations with multiple users or public-facing Cloudlog instances are at higher risk. Given the niche nature of Cloudlog, the impact is more concentrated but still significant for affected communities and organizations in Europe.
Mitigation Recommendations
Organizations should immediately review user access controls to ensure only trusted users have authentication credentials to Cloudlog. Implement strong password policies and consider multi-factor authentication if supported. Monitor and restrict access to the vucc_details_ajax endpoint where possible, using web application firewalls (WAFs) to detect and block suspicious SQL injection patterns targeting the Gridsquare parameter. Until an official patch is released, consider applying input validation or sanitization at the web server or application proxy level to filter out malicious payloads. Regularly audit database logs for unusual queries or activities indicative of injection attempts. Backup databases frequently to enable recovery in case of data corruption. Engage with Cloudlog developers or community to track patch releases and apply updates promptly once available. Educate users about the risks of credential compromise and enforce least privilege principles to minimize potential damage from authenticated attackers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Czech Republic
CVE-2025-64084: n/a
Description
An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function.
AI-Powered Analysis
Technical Analysis
CVE-2025-64084 is an authenticated SQL injection vulnerability identified in Cloudlog version 2.7.5 and earlier. The root cause lies in the vucc_details_ajax function within the application/controllers/Awards.php file, where the Gridsquare POST parameter supplied by the user is not properly sanitized before being used in the vucc_qso_details function. This function concatenates the user input directly into a raw SQL query, violating secure coding practices and enabling SQL injection attacks. An attacker with valid authentication credentials but potentially low privileges can exploit this flaw to execute arbitrary SQL commands against the backend database. This could lead to unauthorized reading or modification of data, potentially compromising confidentiality and integrity of stored information. The vulnerability does not require user interaction beyond authentication and has a CVSS 3.1 base score of 5.4, reflecting medium severity. The attack vector is network-based (remote), with low attack complexity and no user interface required. The scope is unchanged, meaning the vulnerability affects only the vulnerable component without impacting other components. There are no known public exploits at this time, and no patches have been linked yet, indicating organizations should monitor for updates and consider interim mitigations. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and well-understood injection flaw.
Potential Impact
For European organizations using Cloudlog, especially amateur radio clubs, hobbyists, or institutions relying on this software for logging and awards management, this vulnerability poses a risk of unauthorized data access and manipulation. The SQL injection could allow attackers to extract sensitive user data, alter records, or corrupt the database, undermining data integrity and confidentiality. While availability impact is not indicated, the integrity and confidentiality breaches could lead to loss of trust, reputational damage, and potential regulatory compliance issues under GDPR if personal data is involved. The requirement for authentication limits the attack surface but does not eliminate risk, particularly if credentials are weak or compromised. Organizations with multiple users or public-facing Cloudlog instances are at higher risk. Given the niche nature of Cloudlog, the impact is more concentrated but still significant for affected communities and organizations in Europe.
Mitigation Recommendations
Organizations should immediately review user access controls to ensure only trusted users have authentication credentials to Cloudlog. Implement strong password policies and consider multi-factor authentication if supported. Monitor and restrict access to the vucc_details_ajax endpoint where possible, using web application firewalls (WAFs) to detect and block suspicious SQL injection patterns targeting the Gridsquare parameter. Until an official patch is released, consider applying input validation or sanitization at the web server or application proxy level to filter out malicious payloads. Regularly audit database logs for unusual queries or activities indicative of injection attempts. Backup databases frequently to enable recovery in case of data corruption. Engage with Cloudlog developers or community to track patch releases and apply updates promptly once available. Educate users about the risks of credential compromise and enforce least privilege principles to minimize potential damage from authenticated attackers.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-27T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6917959ad767b187e9434ea9
Added to database: 11/14/2025, 8:48:26 PM
Last enriched: 11/21/2025, 9:00:09 PM
Last updated: 12/30/2025, 3:11:32 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15215: Buffer Overflow in Tenda AC10U
HighCVE-2025-69235: CWE-346 Origin Validation Error in NAVER NAVER Whale browser
UnknownCVE-2025-69234: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownCVE-2025-15214: Cross Site Scripting in Campcodes Park Ticketing System
MediumCVE-2025-15213: Improper Authorization in code-projects Student File Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.