Cyber Posture

CVE-2025-1812

MediumPublic PoC

Published: 02 March 2025

Published
02 March 2025
Modified
05 June 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 5.1th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1812 is a medium-severity Injection (CWE-74) vulnerability in Zframeworks Zz. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents SQL injection by validating and sanitizing the userId input before it is used in database queries.

prevent

SI-2 requires timely remediation of the specific SQL injection flaw in the GetUserOrg function through patching, upgrades, or code fixes.

detect

RA-5 enables vulnerability scanning to identify SQL injection vulnerabilities like CVE-2025-1812 in the affected software.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505 Server Software Component Persistence
Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.
T1087 Account Discovery Discovery
Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web endpoint (GetUserOrg) enables remote exploitation (T1190, T1505), account discovery via user/org data dumps (T1087), and data collection from databases (T1213.006).

NVD Description

A vulnerability classified as critical has been found in zj1983 zz up to 2024-08. Affected is the function GetUserOrg of the file com/futvan/z/framework/core/SuperZ.java. The manipulation of the argument userId leads to sql injection. It is possible to launch the attack…

more

remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-1812 is a SQL injection vulnerability affecting the zj1983 zz software up to version 2024-08. The issue resides in the GetUserOrg function within the file com/futvan/z/framework/core/SuperZ.java, where the userId argument can be manipulated to inject malicious SQL payloads. Classified under CWE-74 and CWE-89, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-03-02.

An attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network with low complexity (AC:L) and no user interaction required. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or disruption through injected SQL commands.

Advisories from VulDB and a GitHub issue tracker indicate that the exploit has been publicly disclosed and may be actively used. The vendor was contacted early regarding the issue but provided no response, and no patches or specific mitigations are mentioned in the available references. Security practitioners should review and update affected instances of zj1983 zz where possible, applying input validation or database query parameterization as interim defenses.

Details

CWE(s)

Affected Products

zframeworks
zz
≤ 2024-8

CVEs Like This One

CVE-2025-1820Same product: Zframeworks Zz
CVE-2025-1821Same product: Zframeworks Zz
CVE-2025-1832Same product: Zframeworks Zz
CVE-2025-1831Same product: Zframeworks Zz
CVE-2025-1849Same product: Zframeworks Zz
CVE-2025-1834Same product: Zframeworks Zz
CVE-2025-1848Same product: Zframeworks Zz
CVE-2025-1818Same product: Zframeworks Zz
CVE-2025-1833Same product: Zframeworks Zz
CVE-2025-1847Same product: Zframeworks Zz

References