CVE-2025-25426
Published: 04 March 2025
Summary
CVE-2025-25426 is a high-severity SQL Injection (CWE-89) vulnerability in Guchengwuyue Yshopmall. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and sanitization of user inputs to the image listing interface before incorporation into SQL queries.
Ensures timely identification, reporting, and correction of the specific SQL injection flaw in yshopmall <= v1.9.0, eliminating the vulnerability.
Enforces restrictions on information inputs such as type, length, and format, limiting the feasibility of crafting effective SQL injection payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in network-accessible web app (yshopmall image listing) directly enables T1190 exploitation; arbitrary SQL queries facilitate T1213.006 database data access, with modification/disruption as secondary impacts.
NVD Description
yshopmall <=v1.9.0 is vulnerable to SQL Injection in the image listing interface.
Deeper analysisAI
CVE-2025-25426 is a SQL injection vulnerability (CWE-89) affecting yshopmall versions up to and including v1.9.0, specifically in the image listing interface. Published on 2025-03-04, it has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
The vulnerability can be exploited over the network by authenticated attackers with high privileges (PR:H), requiring low attack complexity and no user interaction. Successful exploitation allows arbitrary SQL query execution, enabling attackers to read sensitive data, modify database contents, or disrupt service availability within the affected yshopmall instance.
Mitigation details are referenced in advisories at https://gist.github.com/Catherines77/79e6b69490b085d9c2d96c99e72c3579 and https://github.com/guchengwuyue/yshopmall/issues/34, which point to the yshopmall GitHub repository for further discussion and potential patches.
Details
- CWE(s)