CVE-2025-25513
Published: 24 February 2025
Summary
CVE-2025-25513 is a critical-severity SQL Injection (CWE-89) vulnerability in Seacms Seacms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 43.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of user inputs at entry points like those in admin_members.php.
Mandates identification, reporting, and correction of flaws such as the SQL injection vulnerability in SeaCMS <=13.3.
Requires vulnerability scanning that detects and facilitates remediation of SQL injection issues in web applications like SeaCMS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in admin_members.php enables exploitation of a public-facing web application (T1190) and facilitates data collection from databases such as user/member information (T1213.006).
NVD Description
Seacms <=13.3 is vulnerable to SQL Injection in admin_members.php.
Deeper analysisAI
CVE-2025-25513 is a SQL injection vulnerability (CWE-89) in the admin_members.php component of SeaCMS versions 13.3 and earlier. Published on 2025-02-24, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no requirement for user interaction. Exploitation grants high confidentiality, integrity, and availability impacts, enabling arbitrary SQL query execution that could result in data exfiltration, modification, or deletion.
The primary advisory reference is available at https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-1.md, which provides details on the issue but does not specify patches or mitigations in the CVE metadata.
Details
- CWE(s)