CVE-2025-13121

7.3 HIGH

📋 TL;DR

CVE-2025-13121 is an SQL injection vulnerability in the Liketea 1.0.0 API endpoint that allows remote attackers to execute arbitrary SQL commands by manipulating lng/lat parameters. This affects all systems running the vulnerable version of Liketea, potentially leading to data theft, modification, or deletion.

💻 Affected Systems

Products:
  • cameasy Liketea
Versions: 1.0.0
Operating Systems: All platforms running PHP/Laravel
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific API endpoint in StoreController.php with lng/lat parameter handling.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data destruction, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized data access and manipulation of the Liketea database, potentially exposing user information and application data.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions in place.

🌐 Internet-Facing: HIGH - The vulnerability is in an API endpoint that can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but have reduced attack surface compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Manually fix the vulnerable code in laravel/app/Http/Controllers/Front/StoreController.php by implementing proper input validation and parameterized queries.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add input validation for lng/lat parameters to ensure they contain only expected data types and ranges.

Web Application Firewall Rules

all

Implement WAF rules to block SQL injection patterns targeting the vulnerable API endpoint.

🧯 If You Can't Patch

  • Restrict network access to the vulnerable API endpoint using firewall rules or network segmentation.
  • Implement rate limiting and monitoring on the affected endpoint to detect exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if running Liketea 1.0.0 and examine the StoreController.php file for vulnerable lng/lat parameter handling without proper input validation.

Check Version:

Check Liketea version in application configuration or package manager.

Verify Fix Applied:

Verify that lng/lat parameters are properly validated and that SQL queries use parameterized statements or prepared queries.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed API requests with SQL injection patterns
  • Unexpected database access patterns

Network Indicators:

  • HTTP requests to the vulnerable endpoint with SQL injection payloads in parameters
  • Unusual traffic patterns to the API endpoint

SIEM Query:

Search for HTTP requests containing SQL keywords (SELECT, UNION, INSERT, etc.) in URL parameters targeting the StoreController endpoint.

🔗 References

📤 Share & Export