CVE-2025-13782

7.3 HIGH

📋 TL;DR

This CVE describes an SQL injection vulnerability in taosir WTCMS's SlideController component. Attackers can exploit this to execute arbitrary SQL commands on the database. All installations up to commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665 are affected.

💻 Affected Systems

Products:
  • taosir WTCMS
Versions: All versions up to commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the SlideController component specifically. Rolling release model means no specific version numbers provided.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, or deletion, and potential server takeover via SQL injection extensions.

🟠

Likely Case

Unauthorized data access, modification of slide content, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting exploit scope.

🌐 Internet-Facing: HIGH - Remote exploitation is possible and public exploit exists.
🏢 Internal Only: MEDIUM - Internal attackers could exploit, but external threat is higher.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to the SlideController delete function. Public references indicate exploit details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor did not respond to disclosure

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative CMS or implementing custom fixes.

🔧 Temporary Workarounds

Input Validation Filter

all

Add parameter validation to the delete function in SlideController.class.php

Edit application/Admin/Controller/SlideController.class.php and add input sanitization for 'ids' parameter

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns

Add WAF rule to detect and block SQL injection attempts in POST parameters

🧯 If You Can't Patch

  • Restrict access to the Admin panel to trusted IP addresses only
  • Implement database user with minimal permissions (read-only where possible)

🔍 How to Verify

Check if Vulnerable:

Check if your installation is at or before commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665

Check Version:

git log --oneline -1

Verify Fix Applied:

Test the SlideController delete function with SQL injection payloads to confirm they're blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple delete requests to SlideController with suspicious parameters

Network Indicators:

  • POST requests to */Admin/Controller/SlideController with SQL injection patterns in parameters

SIEM Query:

source="web_logs" AND uri="*SlideController*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*DELETE*")

🔗 References

📤 Share & Export