Cyber Posture

CVE-2025-57631

CriticalPublic PoC

Published: 16 September 2025

Published
16 September 2025
Modified
23 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0068 71.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-57631 is a critical-severity SQL Injection (CWE-89) vulnerability in Tduckcloud Tduck. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 28.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates validation of information inputs to the file upload module, directly preventing SQL injection exploitation as in CVE-2025-57631.

prevent

SI-2 requires timely identification, reporting, and correction of flaws like the SQL injection vulnerability in TDuckCloud v5.1.

preventdetect

RA-5 employs vulnerability scanning to identify SQL injection vulnerabilities such as CVE-2025-57631 before remote exploitation occurs.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in the file upload module of TDuckCloud v5.1 enables remote attackers to execute arbitrary code, directly facilitating exploitation of a public-facing web application.

NVD Description

SQL Injection vulnerability in TDuckCloud v.5.1 allows a remote attacker to execute arbitrary code via the Add a file upload module

Deeper analysisAI

CVE-2025-57631 is a SQL injection vulnerability (CWE-89) in TDuckCloud version 5.1. The issue resides in the "Add a file upload module," enabling a remote attacker to execute arbitrary code. Published on 2025-09-16T20:15:36.527, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility and high impact potential.

A remote attacker requires no privileges, authentication, or user interaction to exploit this vulnerability over the network with low attack complexity. Successful exploitation allows arbitrary code execution, granting high levels of control over confidentiality, integrity, and availability of the affected system.

Advisories and related discussions are available at http://tduck-platform.com, https://gist.github.com/Theresasu1/b1b57b3763a286d9491541180c99368b, https://github.com/TDuckCloud/tduck-platform, and https://github.com/TDuckCloud/tduck-platform/issues/31, which may provide further details on patches or mitigations.

Details

CWE(s)

Affected Products

tduckcloud
tduck
5.1

CVEs Like This One

CVE-2025-8756Same vendor: Tduckcloud
CVE-2025-0558Same vendor: Tduckcloud
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89
CVE-2026-30531Shared CWE-89
CVE-2025-7636Shared CWE-89

References