SeaCMS <=133, SQL Injection, CVE-2025-25515 (Critical)

How the CVE Works

CVE-2025-25515 exploits improper input sanitization in SeaCMS’s admin_collect.php, allowing authenticated attackers to inject malicious SQL queries. The vulnerability occurs when user-supplied data in collection-related parameters is directly concatenated into SQL statements. Attackers leverage this flaw to manipulate database queries, potentially extracting sensitive information, modifying data, or executing arbitrary commands. The attack requires authentication but can escalate privileges if combined with other weaknesses.

DailyCVE Form:

Platform: SeaCMS
Version: <=13.3
Vulnerability: SQL Injection
Severity: Critical
Date: 03/28/2025

What Undercode Say:

Exploitation:

  1. Craft a malicious POST request to `admin_collect.php` with SQLi payloads in parameters like `keyword` or cid.
  2. Use time-based or error-based techniques to extract database schema.

3. Exfiltrate admin credentials or modify configurations.

Protection:

  1. Patch to SeaCMS 13.4 or apply vendor fixes.

2. Implement prepared statements:

$stmt = $pdo->prepare("SELECT FROM collections WHERE id = ?");
$stmt->execute([bash]);

3. Restrict admin panel access via IP whitelisting.

Detection Commands:

grep -r "mysql_query" /var/www/seacms/ Find raw SQL queries
curl -X POST -d "cid=1 AND SLEEP(5)" http://target/admin_collect.php Test for time-based SQLi

Mitigation Script:

// Sanitize input in admin_collect.php
function sanitize($input) {
return htmlspecialchars(stripslashes($input), ENT_QUOTES, 'UTF-8');
}

Analytics:

  • Attack Complexity: Low (authenticated)
  • Exploit Availability: Public PoCs expected within 30 days.
  • Affected Systems: ~15,000 unpatched instances.

References:

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25515
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top