CVE-2025-13395

7.3 HIGH

📋 TL;DR

This CVE describes a SQL injection vulnerability in the Login function of codehub666 94list software. Attackers can remotely exploit this flaw to execute arbitrary SQL commands, potentially compromising authentication systems and database integrity. All deployments of codehub666 94list up to commit 5831c8240e99a72b7d3508c79ef46ae4b96befe8 are affected.

💻 Affected Systems

Products:
  • codehub666 94list
Versions: All versions up to commit 5831c8240e99a72b7d3508c79ef46ae4b96befe8
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: This product does not use versioning, making precise version identification impossible. All deployments using the vulnerable code are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, authentication bypass, privilege escalation, and potential remote code execution if database functions allow it.

🟠

Likely Case

Authentication bypass leading to unauthorized access, data leakage from user tables, and potential manipulation of application data.

🟢

If Mitigated

Failed login attempts logged, no data access or system compromise if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly released in GitHub issues, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

1. Check if your deployment uses code from before commit 5831c8240e99a72b7d3508c79ef46ae4b96befe8
2. Update to the latest version from the repository if available
3. Manually fix the Login function in /function.php to use parameterized queries

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block exploitation attempts

Input Validation

all

Implement strict input validation on login fields to reject SQL special characters

🧯 If You Can't Patch

  • Isolate the affected system from internet access
  • Implement network segmentation to limit database access

🔍 How to Verify

Check if Vulnerable:

Check if your /function.php file contains the vulnerable Login function code from before commit 5831c8240e99a72b7d3508c79ef46ae4b96befe8

Check Version:

git log --oneline -1 (if using git) or check file modification dates

Verify Fix Applied:

Verify that the Login function now uses parameterized queries or prepared statements instead of string concatenation

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in login attempts
  • Multiple failed login attempts with SQL special characters
  • Database error messages in application logs

Network Indicators:

  • HTTP POST requests to login endpoint containing SQL keywords like UNION, SELECT, INSERT

SIEM Query:

source="web_logs" AND (uri="/function.php" OR uri LIKE "%login%") AND (request_body LIKE "%UNION%" OR request_body LIKE "%SELECT%" OR request_body LIKE "%INSERT%")

🔗 References

📤 Share & Export