CVE-2025-25520
Published: 25 February 2025
Summary
CVE-2025-25520 is a critical-severity SQL Injection (CWE-89) vulnerability in Seacms Seacms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific SQL injection flaw in SeaCMS <13.3 admin_pay.php through timely identification, reporting, and correction of vulnerabilities.
Prevents SQL injection exploitation by implementing input validation mechanisms at the vulnerable admin_pay.php entry point to reject or sanitize malicious SQL payloads.
Boundary protection with web application firewalls monitors and blocks network traffic containing SQL injection attempts targeting the unauthenticated admin_pay.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in admin_pay.php of SeaCMS <13.3 enables exploitation of a public-facing web application (T1190) and unauthorized access to database contents (T1213.006).
NVD Description
Seacms <13.3 is vulnerable to SQL Injection in admin_pay.php.
Deeper analysisAI
CVE-2025-25520 is a SQL injection vulnerability (CWE-89) in SeaCMS versions prior to 13.3, specifically within the admin_pay.php component. Published on 2025-02-25, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its potential for severe impact.
The vulnerability can be exploited by unauthenticated remote attackers over the network with low attack complexity and no user interaction required. Exploitation grants high-impact access to confidentiality, integrity, and availability, allowing attackers to execute arbitrary SQL queries, potentially leading to data extraction, modification, or deletion.
Advisories and mitigation details are documented in the reference at https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-4.md.
Details
- CWE(s)