CVE-2025-1820
Published: 02 March 2025
Summary
CVE-2025-1820 is a medium-severity Injection (CWE-74) vulnerability in Zframeworks Zz. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and sanitization of the tableId input parameter before its use in database queries within the getOaWid function.
Mandates timely identification, reporting, and correction of critical flaws like this SQL injection vulnerability through patching or code remediation.
Enables continuous monitoring of system and database activities to identify exploitation attempts through anomalous SQL queries or indicators of SQL injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web application (ZworkflowAction.java) enables exploitation of public-facing application (T1190), abuse of server software component (T1505 as cited by VulDB), and data collection from databases via arbitrary SQL queries (T1213.006).
NVD Description
A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. The manipulation of the argument tableId leads to sql injection. The attack can…
more
be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-1820 is a critical SQL injection vulnerability affecting zj1983 zz versions up to 2024-8. The issue resides in the getOaWid function within the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java, where manipulation of the tableId argument enables SQL injection. This flaw, classified under CWE-74 and CWE-89, carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and can be exploited remotely.
An attacker with low-privileged user access (PR:L) can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or disruption through injected SQL payloads.
Advisories from VulDB and GitHub repositories detail the vulnerability, noting that the exploit has been publicly disclosed and may be actively used. The vendor was contacted early regarding the issue but provided no response, and no patches or mitigations are mentioned in the available references. Security practitioners should isolate affected systems and monitor for anomalous database queries until updates are available.
Details
- CWE(s)