CVE-2025-26200
Published: 24 February 2025
Summary
CVE-2025-26200 is a high-severity SQL Injection (CWE-89) vulnerability in Slims Senayan Library Management System. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 20.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of untrusted inputs like the month parameter to prevent SQL injection exploitation.
Mandates timely identification, reporting, and correction of flaws such as this SQL injection vulnerability in SLIMS.
Enforces least privilege to limit the scope and impact of privilege escalation achieved via successful SQL injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web component directly enables remote exploitation of public-facing app for privilege escalation.
NVD Description
SQL injection in SLIMS v.9.6.1 allows a remote attacker to escalate privileges via the month parameter in the visitor_report_day.php component.
Deeper analysisAI
CVE-2025-26200 is a SQL injection vulnerability (CWE-89) in SLIMS version 9.6.1. The flaw exists in the visitor_report_day.php component, where insufficient input validation on the month parameter enables a remote attacker to escalate privileges. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-02-24T17:15:14.273.
Exploitation requires high privileges (PR:H) and can be performed remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). A successful attack allows the attacker to escalate privileges, leading to high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope (S:U).
Advisories and additional details are available at https://github.com/slims/slims9_bulian/issues/269 and https://mebroccoli.blogspot.com/2025/02/cve2.html.
Details
- CWE(s)