CVE-2025-25517
Published: 25 February 2025
Summary
CVE-2025-25517 is a critical-severity SQL Injection (CWE-89) vulnerability in Seacms Seacms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific SQL injection flaw in SeaCMS admin_reslib.php through patching or code fixes as detailed in the advisory.
Enforces validation and sanitization of untrusted inputs to admin_reslib.php, directly blocking malicious SQL payloads from execution.
Provides vulnerability scanning to identify SQL injection issues like CVE-2025-25517 in SeaCMS for prioritized remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in the public-facing SeaCMS web application (admin_reslib.php) enables exploitation of public-facing applications (T1190) and collection of data from databases via arbitrary queries (T1213.006).
NVD Description
Seacms <=13.3 is vulnerable to SQL Injection in admin_reslib.php.
Deeper analysisAI
CVE-2025-25517 is a SQL injection vulnerability (CWE-89) in SeaCMS versions 13.3 and earlier, specifically within the admin_reslib.php component. Published on 2025-02-25T22:15:24.160, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Remote attackers require no authentication privileges and no user interaction to exploit this over the network with low attack complexity. Exploitation enables arbitrary SQL query execution, granting high-impact access to confidentiality, integrity, and availability of the affected database, which could lead to data exfiltration, modification, or destruction.
Mitigation details are available in the referenced advisory at https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-7.md.
Details
- CWE(s)