CVE-2025-25515
Published: 25 February 2025
Summary
CVE-2025-25515 is a high-severity SQL Injection (CWE-89) vulnerability in Seacms Seacms. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 33.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection in admin_collect.php by validating and sanitizing user inputs before database queries.
Remediates the specific SQL injection flaw in SeaCMS <=13.3 through timely identification, testing, and correction.
Limits damage from successful SQL injection by enforcing least privilege on the application's database account.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web application admin panel enables exploitation of public-facing or remote services (T1190, T1210) and arbitrary database queries for data collection (T1213.006).
NVD Description
Seacms <=13.3 is vulnerable to SQL Injection in admin_collect.php that allows an authenticated attacker to exploit the database.
Deeper analysisAI
CVE-2025-25515 is a SQL injection vulnerability affecting SeaCMS versions 13.3 and earlier, specifically in the admin_collect.php component. Published on 2025-02-25, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-89. The flaw enables an authenticated attacker to inject malicious SQL queries into the database through this administrative script.
An attacker with low-privilege authenticated access (such as an admin user) can exploit this over the network with low complexity and no user interaction required. Successful exploitation grants high-impact control over confidentiality, integrity, and availability, potentially allowing arbitrary database operations like data exfiltration, modification, or deletion.
Advisories detailing the vulnerability, including a proof-of-concept, are available at https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-5.md.
Details
- CWE(s)