CVE-2025-8347: SQL Injection in Kehua Charging Pile Cloud Platform
A vulnerability, which was classified as critical, was found in Kehua Charging Pile Cloud Platform 1.0. This affects an unknown part of the file /sys/task/findAllTask. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8347 is a SQL Injection vulnerability identified in version 1.0 of the Kehua Charging Pile Cloud Platform, specifically affecting an unspecified component within the /sys/task/findAllTask endpoint. This vulnerability allows an unauthenticated remote attacker with low privileges to manipulate SQL queries by injecting malicious input, potentially leading to unauthorized access or modification of the backend database. The vulnerability is classified with a CVSS 4.0 base score of 5.3, indicating medium severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but with low privileges, and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while exploitation is possible remotely, the extent of damage or data exposure may be constrained by the platform's design or existing access controls. The vendor has been notified but has not responded or released a patch, and public exploit details have been disclosed, increasing the risk of exploitation. The lack of patch availability and vendor response heightens the urgency for affected organizations to implement compensating controls. The vulnerability's presence in a cloud platform managing charging piles (electric vehicle charging infrastructure) raises concerns about potential disruption or data compromise in critical energy infrastructure management systems.
Potential Impact
For European organizations, particularly those involved in electric vehicle infrastructure management, energy utilities, or smart city deployments, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized database access, potentially exposing sensitive operational data, user information, or configuration details. Although the CVSS indicates limited impact, the critical nature of charging infrastructure in supporting the transition to electric mobility means any disruption or data breach could have cascading effects on service availability and user trust. Attackers might leverage this vulnerability to manipulate task scheduling or operational parameters within the platform, potentially causing service interruptions or inaccurate billing. Given the increasing adoption of EV infrastructure across Europe, a successful attack could affect multiple stakeholders, including service providers, municipalities, and end-users. The absence of vendor remediation increases the risk window, making proactive defense essential.
Mitigation Recommendations
Since no official patch is available, European organizations should implement the following specific mitigations: 1) Conduct immediate code and query parameter validation audits on the /sys/task/findAllTask endpoint to identify and block injection attempts using web application firewalls (WAF) with tailored SQL injection detection rules. 2) Restrict network access to the Charging Pile Cloud Platform management interfaces to trusted IP ranges and enforce strict authentication and authorization controls to limit exposure. 3) Employ database activity monitoring to detect anomalous queries indicative of injection attempts. 4) Implement input sanitization and parameterized queries in any custom integrations or scripts interacting with the platform. 5) Monitor public threat intelligence feeds for emerging exploit tools targeting this CVE and prepare incident response plans accordingly. 6) Engage with Kehua or third-party security vendors for potential unofficial patches or workarounds. 7) Isolate the platform within segmented network zones to minimize lateral movement in case of compromise.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-8347: SQL Injection in Kehua Charging Pile Cloud Platform
Description
A vulnerability, which was classified as critical, was found in Kehua Charging Pile Cloud Platform 1.0. This affects an unknown part of the file /sys/task/findAllTask. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8347 is a SQL Injection vulnerability identified in version 1.0 of the Kehua Charging Pile Cloud Platform, specifically affecting an unspecified component within the /sys/task/findAllTask endpoint. This vulnerability allows an unauthenticated remote attacker with low privileges to manipulate SQL queries by injecting malicious input, potentially leading to unauthorized access or modification of the backend database. The vulnerability is classified with a CVSS 4.0 base score of 5.3, indicating medium severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but with low privileges, and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while exploitation is possible remotely, the extent of damage or data exposure may be constrained by the platform's design or existing access controls. The vendor has been notified but has not responded or released a patch, and public exploit details have been disclosed, increasing the risk of exploitation. The lack of patch availability and vendor response heightens the urgency for affected organizations to implement compensating controls. The vulnerability's presence in a cloud platform managing charging piles (electric vehicle charging infrastructure) raises concerns about potential disruption or data compromise in critical energy infrastructure management systems.
Potential Impact
For European organizations, particularly those involved in electric vehicle infrastructure management, energy utilities, or smart city deployments, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized database access, potentially exposing sensitive operational data, user information, or configuration details. Although the CVSS indicates limited impact, the critical nature of charging infrastructure in supporting the transition to electric mobility means any disruption or data breach could have cascading effects on service availability and user trust. Attackers might leverage this vulnerability to manipulate task scheduling or operational parameters within the platform, potentially causing service interruptions or inaccurate billing. Given the increasing adoption of EV infrastructure across Europe, a successful attack could affect multiple stakeholders, including service providers, municipalities, and end-users. The absence of vendor remediation increases the risk window, making proactive defense essential.
Mitigation Recommendations
Since no official patch is available, European organizations should implement the following specific mitigations: 1) Conduct immediate code and query parameter validation audits on the /sys/task/findAllTask endpoint to identify and block injection attempts using web application firewalls (WAF) with tailored SQL injection detection rules. 2) Restrict network access to the Charging Pile Cloud Platform management interfaces to trusted IP ranges and enforce strict authentication and authorization controls to limit exposure. 3) Employ database activity monitoring to detect anomalous queries indicative of injection attempts. 4) Implement input sanitization and parameterized queries in any custom integrations or scripts interacting with the platform. 5) Monitor public threat intelligence feeds for emerging exploit tools targeting this CVE and prepare incident response plans accordingly. 6) Engage with Kehua or third-party security vendors for potential unofficial patches or workarounds. 7) Isolate the platform within segmented network zones to minimize lateral movement in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-30T10:38:34.822Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 688ae05bad5a09ad00b25691
Added to database: 7/31/2025, 3:17:47 AM
Last enriched: 7/31/2025, 3:32:43 AM
Last updated: 8/1/2025, 12:34:42 AM
Views: 7
Related Threats
CVE-2025-8431: SQL Injection in PHPGurukul Boat Booking System
MediumCVE-2025-23289: CWE-532 Insertion of Sensitive Information into Log File in NVIDIA NVIDIA Omniverse Launcher
MediumCVE-2025-48073: CWE-476: NULL Pointer Dereference in AcademySoftwareFoundation openexr
MediumCVE-2025-48072: CWE-125: Out-of-bounds Read in AcademySoftwareFoundation openexr
MediumCVE-2025-48071: CWE-122: Heap-based Buffer Overflow in AcademySoftwareFoundation openexr
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.