CVE-2025-1227
Published: 12 February 2025
Summary
CVE-2025-1227 is a medium-severity Injection (CWE-74) vulnerability in R1Bbit Yimioa. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and neutralization of special elements in user inputs to the vulnerable selectList function.
Mandates timely remediation of the specific SQL injection flaw through patching to ywoa version 2024.07.04.
Facilitates identification of the SQL injection vulnerability via automated scanning and drives subsequent flaw remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app enables initial access via public-facing application exploitation (T1190), server software component abuse (T1505 as noted in advisory), and data collection from databases (T1213.006).
NVD Description
A vulnerability was found in ywoa up to 2024.07.03. It has been rated as critical. This issue affects the function selectList of the file com/cloudweb/oa/mapper/xml/AddressDao.xml. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has…
more
been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component.
Deeper analysisAI
CVE-2025-1227 is a SQL injection vulnerability affecting ywoa versions up to 2024.07.03. The issue resides in the selectList function within the file com/cloudweb/oa/mapper/xml/AddressDao.xml. Rated as critical with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), it corresponds to CWE-74 (Improper Neutralization of Special Elements) and CWE-89 (SQL Injection). The vulnerability was published on 2025-02-12.
An attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By manipulating input to the affected function, the attacker can inject malicious SQL payloads, potentially leading to limited impacts on confidentiality, integrity, and availability, such as unauthorized data access, modification, or denial of service within the scope of the low-privileged context.
Advisories recommend upgrading to ywoa version 2024.07.04, which addresses the issue. The exploit has been publicly disclosed and may be used, as noted in references including Gitee issues at https://gitee.com/r1bbit/yimioa/issues/IBI7XH and VulDB entries at https://vuldb.com/?ctiid.295217 and https://vuldb.com/?id.295217.
Details
- CWE(s)