CVE-2025-12865
Published: 10 November 2025
Summary
CVE-2025-12865 is a high-severity SQL Injection (CWE-89) vulnerability in Edetw U-Office Force. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of user inputs to prevent SQL injection vulnerabilities like CVE-2025-12865.
Mandates timely identification, reporting, and correction of flaws such as this SQL injection vulnerability through patching.
Enforces least privilege on database accounts used by the application to limit the impact of successful SQL injection exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible application enables exploitation of a public-facing application (T1190) and direct access to database contents for data collection (T1213.006).
NVD Description
U-Office Force developed by e-Excellence has a SQL Injection vulnerability, allowing authenticated remote attacker to inject arbitrary SQL commands to read, modify, and delete database contents.
Deeper analysisAI
CVE-2025-12865 is a SQL injection vulnerability (CWE-89) affecting U-Office Force, a software package developed by e-Excellence. Published on 2025-11-10, the flaw allows an authenticated remote attacker to inject arbitrary SQL commands into the application, potentially compromising the underlying database. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, and significant impacts across confidentiality, integrity, and availability.
An attacker with low-privilege authenticated access over the network can exploit this vulnerability without user interaction. Successful exploitation enables arbitrary SQL command injection, allowing the attacker to read sensitive data from the database, modify records, or delete contents, which could lead to full database compromise depending on the backend configuration and privileges.
Advisories from TWCERT/CC detail the issue and recommend mitigation measures, available at https://www.twcert.org.tw/en/cp-139-10489-a5a6d-2.html and https://www.twcert.org.tw/tw/cp-132-10488-2df22-1.html. Security practitioners should consult these for specific patching instructions or workarounds applicable to U-Office Force deployments.
Details
- CWE(s)