CVE-2025-22210
Published: 25 February 2025
Summary
CVE-2025-22210 is a high-severity SQL Injection (CWE-89) vulnerability in Hikashop Hikashop. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates input validation and error handling to block SQL injection exploits in the Hikashop category management area due to insufficient validation.
Requires timely identification, reporting, and correction of the specific SQL injection flaw in Hikashop versions 3.3.0-5.1.4.
Enforces input restrictions such as length, type, and format at application boundaries to complement validation and hinder SQL command injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in Joomla backend enables exploitation of public-facing web app (T1190), arbitrary SQL queries for database data collection (T1213.006), and data manipulation/deletion (T1565.001).
NVD Description
A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the category management area in backend.
Deeper analysisAI
CVE-2025-22210 is a SQL injection vulnerability (CWE-89) affecting the Hikashop component for Joomla in versions 3.3.0 through 5.1.4. Published on 2025-02-25, it resides in the category management area of the backend, where insufficient input validation allows arbitrary SQL command execution. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
Authenticated attackers with administrator privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation enables execution of arbitrary SQL commands, potentially allowing full database compromise, data extraction, modification, or deletion within the Joomla site's backend environment.
Advisories and further details are available in the provided references, including a GitHub repository at https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-22210 and the official Hikashop site at https://www.hikashop.com/. Security practitioners should consult these sources for patch information and mitigation guidance specific to affected versions.
Details
- CWE(s)