CVE-2025-0540
Published: 17 January 2025
Summary
CVE-2025-0540 is a medium-severity Injection (CWE-74) vulnerability in Angeljudesuarez Tailoring Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly and comprehensively prevents SQL injection by requiring validation of the 'expcat' argument and other inputs before database processing.
SI-2 mandates timely identification, reporting, and correction of the specific SQL injection flaw in /expadd.php.
RA-5 requires vulnerability scanning that identifies SQL injection issues like CVE-2025-0540 in the Tailoring Management System.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (/expadd.php) enables exploitation for initial access (T1190) and unauthorized database queries for data collection (T1213.006), as demonstrated by time-based blind SQLi POC allowing DB enumeration.
NVD Description
A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely.…
more
The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0540 is a critical SQL injection vulnerability in itsourcecode Tailoring Management System 1.0, published on 2025-01-17. The issue resides in unknown code of the file /expadd.php, where manipulation of the 'expcat' argument triggers the injection. It is associated with CWEs-74 (Improper Neutralization of Special Elements in Output) and CWE-89 (SQL Injection), carrying a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
A remote attacker with low privileges, such as an authenticated user, can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation enables limited impacts: partial disclosure of sensitive data (low confidentiality), limited modification of data or system (low integrity), and limited denial of service (low availability).
Advisories detail the issue on VulDB (ctiid.292432, id.292432, submit.480063), a GitHub repository issue (magic2353112890/cve/issues/1), and the vendor site (itsourcecode.com). The exploit has been publicly disclosed and may be used by attackers. No specific patches or mitigations are detailed in the provided information.
Details
- CWE(s)