Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8311: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dotCMS dotCMS Cloud Services (dCS)

0
Critical
VulnerabilityCVE-2025-8311cvecve-2025-8311cwe-89
Published: Thu Sep 04 2025 (09/04/2025, 14:12:42 UTC)
Source: CVE Database V5
Vendor/Project: dotCMS
Product: dotCMS Cloud Services (dCS)

Description

dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys. The vulnerability was triggered via the sites parameter, which was directly concatenated into a SQL query without proper sanitization. Exploitation allowed an authenticated attacker with low privileges to extract data from database, perform privilege escalation, or trigger denial-of-service conditions. The vulnerability was verified using tools such as SQLMap and confirmed to allow full database exfiltration and potential denial-of-service conditions via crafted payloads. The vulnerability is fixed in the following versions of dotCMS stack: 25.08.14 / 25.07.10-1v2 LTS / 24.12.27v10 LTS / 24.04.24v21 LTS

AI-Powered Analysis

AILast updated: 09/11/2025, 19:12:44 UTC

Technical Analysis

CVE-2025-8311 is a critical SQL Injection vulnerability affecting dotCMS Cloud Services (dCS) versions 24.03.22 and later. The flaw resides in the /api/v1/contenttype endpoint, specifically in the handling of the 'sites' query parameter, which accepts a comma-separated list of site identifiers or keys. This parameter is directly concatenated into a SQL query without proper sanitization or parameterization, leading to a Boolean-based blind SQL injection vulnerability (CWE-89). An authenticated attacker with low privileges can exploit this flaw to extract sensitive data from the backend database, escalate privileges within the application, or cause denial-of-service (DoS) conditions by crafting malicious payloads. The vulnerability was confirmed using automated tools such as SQLMap, demonstrating the ability to fully exfiltrate database contents and disrupt service availability. The vulnerability affects multiple recent versions of dotCMS, a popular content management system used in cloud environments. The vendor has addressed the issue in versions 25.08.14, 25.07.10-1v2 LTS, 24.12.27v10 LTS, and 24.04.24v21 LTS. The CVSS 4.0 base score is 9.4 (critical), reflecting the network attack vector, low attack complexity, no user interaction, and the high impact on confidentiality, integrity, and availability. No known exploits are currently observed in the wild, but the ease of exploitation and severity make this a significant threat for organizations relying on dotCMS Cloud Services.

Potential Impact

For European organizations using dotCMS Cloud Services, this vulnerability poses a severe risk. Exploitation could lead to unauthorized disclosure of sensitive data, including potentially personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Privilege escalation could allow attackers to gain administrative control, facilitating further compromise or persistent access. Denial-of-service attacks could disrupt critical web content delivery, impacting business operations and customer experience. Given dotCMS's use in various sectors such as media, publishing, and enterprise content management, the impact could extend to critical infrastructure and services. The breach of confidentiality and integrity could also undermine trust in digital services and lead to financial losses. Organizations in Europe must consider the regulatory implications of data breaches and the operational risks associated with service outages caused by this vulnerability.

Mitigation Recommendations

Organizations should urgently upgrade affected dotCMS Cloud Services instances to the fixed versions: 25.08.14, 25.07.10-1v2 LTS, 24.12.27v10 LTS, or 24.04.24v21 LTS. Until patching is complete, implement strict input validation and sanitization on the 'sites' parameter at the application or web application firewall (WAF) level to block suspicious payloads indicative of SQL injection attempts. Employ runtime application self-protection (RASP) if available to detect and prevent injection attacks in real time. Review and tighten authentication and authorization controls to limit the privileges of users who can access the vulnerable endpoint, reducing the attack surface. Conduct thorough logging and monitoring of API access patterns to detect anomalous queries or repeated failed attempts that may indicate exploitation attempts. Additionally, perform regular database backups and ensure incident response plans are updated to address potential data exfiltration or service disruption scenarios. Engage with dotCMS support for guidance on secure configuration and consider penetration testing to validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dotCMS
Date Reserved
2025-07-29T15:02:05.359Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b99f9af6759e9e78017a6a

Added to database: 9/4/2025, 2:18:02 PM

Last enriched: 9/11/2025, 7:12:44 PM

Last updated: 10/18/2025, 7:33:56 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats