CVE-2025-10210

6.3 MEDIUM

📋 TL;DR

This CVE describes a SQL injection vulnerability in ChanCMS up to version 3.3.0, specifically in the Search function's key parameter. Attackers can remotely exploit this to execute arbitrary SQL commands on the database. All users running vulnerable versions of ChanCMS are affected.

💻 Affected Systems

Products:
  • yanyutao0402 ChanCMS
Versions: Up to and including 3.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable Search function are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, or deletion, and potential server takeover via SQL injection leading to remote code execution.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Proof of concept is publicly available but requires some technical knowledge to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider applying community fixes or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the Search function's key parameter.

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block exploitation attempts.

🧯 If You Can't Patch

  • Disable or restrict access to the vulnerable Search API endpoint
  • Implement network segmentation to isolate the ChanCMS instance from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check if running ChanCMS version 3.3.0 or earlier by examining the application version in admin panel or source code.

Check Version:

Check application configuration files or admin interface for version information.

Verify Fix Applied:

Test the Search function with SQL injection payloads to confirm they are properly sanitized or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed search attempts with special characters
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP requests to /api/search with SQL injection patterns in parameters
  • Unusual database connection patterns from application server

SIEM Query:

source="app_logs" AND ("SQL syntax" OR "unexpected token" OR "Search key=")

🔗 References

📤 Share & Export