CVE-2025-0943
Published: 01 February 2025
Summary
CVE-2025-0943 is a medium-severity Injection (CWE-74) vulnerability in Angeljudesuarez Tailoring Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation and sanitization of the 'id' argument in deldoc.php, directly preventing SQL injection by neutralizing malicious payloads.
SI-2 requires timely identification, reporting, and correction of the SQL injection flaw in deldoc.php, eliminating the vulnerability.
RA-5 vulnerability scanning detects the SQL injection in deldoc.php, enabling remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing PHP web application (Tailoring Management System) enables exploitation of public-facing application (T1190) and direct unauthorized access/collection from backend databases (T1213.006).
NVD Description
A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file deldoc.php. The manipulation of the argument id leads to sql injection. The attack can be initiated…
more
remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-0943 is a critical SQL injection vulnerability in itsourcecode Tailoring Management System 1.0, affecting unknown code in the deldoc.php file. The issue arises from manipulation of the 'id' argument and is classified under CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-89 (SQL Injection). It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-02-01.
The vulnerability enables remote exploitation by low-privileged attackers requiring low complexity and no user interaction. Successful attacks can result in limited impacts to confidentiality, integrity, and availability, potentially allowing unauthorized SQL operations such as data extraction, modification, or disruption within the affected application.
Advisories and additional details are documented in references including VulDB entries (ctiid.294298, id.294298, submit.488498), a GitHub issue at magic2353112890/cve/issues/7, and the vendor site at itsourcecode.com. The exploit has been publicly disclosed and may be used by attackers.
Details
- CWE(s)