Cyber Posture

CVE-2025-24787

High

Published: 06 February 2025

Published
06 February 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0018 39.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24787 is a high-severity Improper Neutralization of Special Elements in Data Query Logic (CWE-943) vulnerability in Clidey Whodb. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents parameter injection attacks by validating and sanitizing user inputs used to construct database connection URIs.

prevent

Mitigates the vulnerability by requiring timely remediation through upgrading to the patched version 0.45.0 that fixes unsafe string concatenation.

prevent

Complements input validation by restricting user-supplied connection string parameters to authorized formats and values, blocking injection of dangerous options like allowAllFiles=true.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Vulnerability in public-facing WhoDB enables unauthenticated network exploitation (T1190) leading to arbitrary local file reads via injected MySQL connection parameters (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application…

more

uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `&allowAllFiles=true` into the connection URI and connecting to any MySQL server (such as an attacker-controlled one), the attacker is able to read local files. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Deeper analysisAI

CVE-2025-24787 affects WhoDB, an open source database management tool, in versions prior to 0.45.0. The vulnerability stems from unsafe string concatenation when building database connection URIs, without properly escaping or encoding user input. This enables parameter injection into the URI, particularly dangerous when using the github.com/go-sql-driver/mysql library, where parameters like allowAllFiles=true can be injected to enable execution of LOAD DATA LOCAL INFILE queries on arbitrary local files.

Any unauthenticated network attacker (PR:N) with the ability to supply input influencing the database connection string can exploit this issue. By injecting &allowAllFiles=true into the URI and connecting to any MySQL server—including one controlled by the attacker—the exploiter can read arbitrary files on the host machine running WhoDB. The CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) reflects high confidentiality impact with changed scope, stemming from CWE-943 (improper neutralization of special elements in data query logic).

The GitHub security advisory (GHSA-c7w4-9wv8-7x7c) confirms the issue has been fixed in WhoDB version 0.45.0, urging all users to upgrade immediately. No workarounds are available.

Details

CWE(s)

Affected Products

clidey
whodb
≤ 0.45.0

CVEs Like This One

CVE-2025-24786Same product: Clidey Whodb
CVE-2026-32248Shared CWE-943
CVE-2026-41327Shared CWE-943
CVE-2026-41328Shared CWE-943
CVE-2026-30941Shared CWE-943
CVE-2026-29793Shared CWE-943
CVE-2026-22558Shared CWE-943
CVE-2026-40351Shared CWE-943
CVE-2026-3023Shared CWE-943
CVE-2026-41274Shared CWE-943

References