SeaCMS, SQL Injection, CVE-2025-25514 (Critical)

How the Vulnerability Works:

CVE-2025-25514 exploits improper input sanitization in SeaCMS v13.3’s admin_collect_news.php component. Attackers craft malicious SQL queries through the ‘keyword’ parameter, which gets directly concatenated into database operations. This allows UNION-based injection to extract sensitive data like admin credentials. The vulnerability stems from missing prepared statements and weak filter bypass techniques using URL encoding.

DailyCVE Form:

Platform: SeaCMS
Version: <=13.3
Vulnerability: SQL Injection
Severity: Critical
Date: 03/28/2025

What Undercode Say:

-- Exploit PoC (URL-encoded):
/admin_collect_news.php?keyword=test%27%20UNION%20SELECT%201,2,3,4,5,6,concat(0x7c,userid,0x7c,pwd,0x7c),8,9,10,11%20FROM%20sea_admin%23
-- Detection command:
grep -r "mysql_query.\$<em>GET" /path/to/seacms/
-- Protection patch:
$keyword = addslashes(htmlspecialchars($_GET[bash], ENT_QUOTES));
$query = "SELECT FROM sea_news WHERE LIKE '%$keyword%'";
-- WAF rule to block:
SecRule ARGS_GET:keyword "@detectSQLi" "id:10005,deny,status:403"
-- Database hardening:
REVOKE ALL PRIVILEGES ON seacms. FROM 'seacms_user'@'localhost';
GRANT SELECT ONLY ON seacms. TO 'seacms_user'@'localhost';
-- Log analysis regex:
/\/admin_collect_news.php\?keyword=.([bash]|--|UNION)/i
-- PHP.ini mitigation:
disable_functions = "mysql</em>,mysqli_"
sql.safe_mode = On
-- Backup verification command:
mysqldump -u root -p --skip-extended-insert seacms > seacms_backup.sql
-- Post-exploit cleanup:
DELETE FROM sea_admin_sessions WHERE ip = 'attacker_ip';

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25514
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top