CVE-2025-70397
Published: 17 February 2026
Summary
CVE-2025-70397 is a high-severity SQL Injection (CWE-89) vulnerability in Jizhicms Jizhicms. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in publicly accessible CMS admin endpoints directly enables T1190 (Exploit Public-Facing Application) for arbitrary SQL execution with high impact on C/I/A.
NVD Description
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.
Deeper analysisAI
CVE-2025-70397 is a SQL injection vulnerability (CWE-89) in jizhicms version 2.5.6, published on 2026-02-17. The issue affects the Article/deleteAll and Extmolds/deleteAll endpoints, where the 'data' parameter fails to properly sanitize user input, allowing injection of malicious SQL queries. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant data compromise.
Attackers with high privileges, such as authenticated administrators, can exploit this over the network with low complexity and no user interaction required. By crafting payloads in the 'data' parameter, they can execute arbitrary SQL commands, leading to high-impact outcomes: unauthorized access to sensitive data (confidentiality), modification or deletion of database contents (integrity), and disruption of service (availability).
Advisories and further details are available at http://jizhicms.com and https://www.23882.me/index.php/2026/02/15/jizhicms-%e5%90%8e%e5%8f%b0%e5%ad%98%e5%9c%a8sql%e6%b3%a8%e5%85%a5/. Security practitioners should consult these for vendor-recommended patches or workarounds.
Details
- CWE(s)