CVE-2025-25521
Published: 25 February 2025
Summary
CVE-2025-25521 is a critical-severity SQL Injection (CWE-89) vulnerability in Seacms Seacms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-25521 by identifying, reporting, and correcting the SQL injection flaw in SeaCMS admin_type_news.php through patching or updates.
Prevents SQL injection exploitation by validating and sanitizing untrusted inputs to the vulnerable admin_type_news.php script before database query construction.
Boundary protection mechanisms like web application firewalls monitor and block SQL injection payloads targeting the unauthenticated admin_type_news.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in admin_type_news.php enables exploitation of a public-facing web application (T1190) and facilitates unauthorized access and extraction of data from the backend database (T1213.006).
NVD Description
Seacms <=13.3 is vulnerable to SQL Injection in admin_type_news.php.
Deeper analysisAI
CVE-2025-25521 is a SQL injection vulnerability (CWE-89) in SeaCMS versions 13.3 and earlier, specifically within the admin_type_news.php component. Published on 2025-02-25, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Remote attackers require no authentication privileges or user interaction and can exploit the flaw over the network with low attack complexity. Successful exploitation enables arbitrary SQL query execution, granting high-impact access to confidentiality, integrity, and availability of the affected database.
Mitigation details are available in the referenced advisory at https://github.com/Colorado-all/cve/blob/main/seacms/seacms%20V13.3-sql-3.md.
Details
- CWE(s)