Cyber Posture

CVE-2025-0698

Medium

Published: 24 January 2025

Published
24 January 2025
Modified
10 October 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0023 45.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0698 is a medium-severity Injection (CWE-74) vulnerability in Joeybling Bootplus. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 45.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and correction of the SQL injection flaw in the bootplus /admin/sys/menu/list function up to the affected commit.

prevent

Prevents SQL injection exploitation by validating and sanitizing the user-supplied sort/order parameters before incorporation into SQL queries.

detect

Facilitates detection of the SQL injection vulnerability through regular automated scanning, especially given its low complexity and public exploit availability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in a remotely reachable admin web endpoint directly enables exploitation of a public-facing application.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been classified as critical. Affected is an unknown function of the file /admin/sys/menu/list. The manipulation of the argument sort/order leads to sql injection. It is possible to launch…

more

the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

Deeper analysisAI

CVE-2025-0698 is a SQL injection vulnerability (classified under CWE-74 and CWE-89) in JoeyBling bootplus up to commit 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. The flaw affects an unknown function in the file /admin/sys/menu/list, where manipulation of the sort/order arguments enables SQL injection.

The vulnerability is exploitable remotely by an authenticated attacker with low privileges (PR:L), requiring no user interaction and low complexity (AV:N/AC:L/UI:N). Per its CVSS v3.1 base score of 6.3 (C:L/I:L/A:L/S:U), exploitation can result in limited impacts to confidentiality, integrity, and availability. The exploit has been publicly disclosed and may be used.

Advisories, including GitHub issues #19 and #19#issue-2786879797 in the bootplus repository as well as VulDB entries, provide details on the issue. The project employs continuous delivery with rolling releases, so no specific affected or patched versions are available; security practitioners should monitor the repository for updates beyond the referenced commit.

Details

CWE(s)

Affected Products

joeybling
bootplus
≤ 2020-08-24

CVEs Like This One

CVE-2025-0701Same product: Joeybling Bootplus
CVE-2025-0699Same product: Joeybling Bootplus
CVE-2025-0700Same product: Joeybling Bootplus
CVE-2025-0702Same product: Joeybling Bootplus
CVE-2026-4844Shared CWE-74, CWE-89
CVE-2026-3790Shared CWE-74, CWE-89
CVE-2026-5813Shared CWE-74, CWE-89
CVE-2026-3406Shared CWE-74, CWE-89
CVE-2026-3151Shared CWE-74, CWE-89
CVE-2025-1809Shared CWE-74, CWE-89

References