Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65877: n/a

0
High
VulnerabilityCVE-2025-65877cvecve-2025-65877
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Lvzhou CMS before commit c4ea0eb9cab5f6739b2c87e77d9ef304017ed615 (2025-09-22) is vulnerable to SQL injection via the 'title' parameter in com.wanli.lvzhoucms.service.ContentService#findPage. The parameter is concatenated directly into a dynamic SQL query without sanitization or prepared statements, enabling attackers to read sensitive data from the database.

AI-Powered Analysis

AILast updated: 12/09/2025, 20:56:22 UTC

Technical Analysis

CVE-2025-65877 identifies a SQL injection vulnerability in Lvzhou CMS, specifically affecting versions before the commit c4ea0eb9cab5f6739b2c87e77d9ef304017ed615 dated 2025-09-22. The vulnerability arises from the 'title' parameter in the ContentService#findPage method, where user-supplied input is concatenated directly into a dynamic SQL query without any sanitization or use of parameterized queries. This insecure coding practice (CWE-89) enables attackers to inject malicious SQL code remotely over the network without authentication or user interaction. Exploiting this flaw allows attackers to read sensitive data from the backend database, compromising confidentiality. The CVSS v3.1 score of 7.5 reflects high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime candidate for exploitation once weaponized. The lack of available patches at the time of reporting increases the urgency for organizations to implement interim mitigations. The vulnerability impacts the integrity of data retrieval processes and could lead to unauthorized disclosure of sensitive information, potentially including user data, credentials, or configuration details stored in the database.

Potential Impact

For European organizations, the primary impact of CVE-2025-65877 is the potential unauthorized disclosure of sensitive data stored within Lvzhou CMS databases. This could include personal data protected under GDPR, intellectual property, or internal business information, leading to regulatory penalties, reputational damage, and operational disruption. Since the vulnerability requires no authentication and no user interaction, attackers can remotely exploit it at scale, increasing the risk of widespread data breaches. Organizations relying on Lvzhou CMS for content management, especially those in sectors like government, finance, healthcare, or critical infrastructure, face heightened risks. Data exfiltration could also facilitate further attacks such as phishing, identity theft, or lateral movement within networks. The absence of known exploits currently provides a window for proactive defense, but the vulnerability’s presence in a CMS—a common target for attackers—means European entities must act swiftly to mitigate exposure.

Mitigation Recommendations

1. Immediate application of the official patch or update from Lvzhou CMS once available is the most effective mitigation. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'title' parameter. 3. Employ input validation and sanitization on all user-supplied data, specifically enforcing strict whitelisting or escaping of special characters in the 'title' parameter. 4. Modify the application code to use prepared statements or parameterized queries instead of dynamic SQL concatenation. 5. Conduct thorough code reviews and security testing (e.g., static analysis, dynamic scanning) focusing on SQL injection vulnerabilities. 6. Monitor database logs and application logs for unusual query patterns or error messages indicative of injection attempts. 7. Restrict database user permissions to the minimum necessary to limit data exposure in case of exploitation. 8. Educate development teams on secure coding practices to prevent similar vulnerabilities in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f4367afa3b8e14e1402b1

Added to database: 12/2/2025, 7:52:07 PM

Last enriched: 12/9/2025, 8:56:22 PM

Last updated: 1/16/2026, 11:39:57 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats