CVE-2025-13782
📋 TL;DR
This CVE describes an SQL injection vulnerability in taosir WTCMS's SlideController component. Attackers can exploit this to execute arbitrary SQL commands on the database. All installations up to commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665 are affected.
💻 Affected Systems
- taosir WTCMS
📦 What is this software?
Wtcms by Wtcms Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, modification, or deletion, and potential server takeover via SQL injection extensions.
Likely Case
Unauthorized data access, modification of slide content, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation and database permissions restricting exploit scope.
🎯 Exploit Status
Exploit requires access to the SlideController delete function. Public references indicate exploit details are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - vendor did not respond to disclosure
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative CMS or implementing custom fixes.
🔧 Temporary Workarounds
Input Validation Filter
allAdd parameter validation to the delete function in SlideController.class.php
Edit application/Admin/Controller/SlideController.class.php and add input sanitization for 'ids' parameter
WAF Rule
allImplement web application firewall rules to block SQL injection patterns
Add WAF rule to detect and block SQL injection attempts in POST parameters
🧯 If You Can't Patch
- Restrict access to the Admin panel to trusted IP addresses only
- Implement database user with minimal permissions (read-only where possible)
🔍 How to Verify
Check if Vulnerable:
Check if your installation is at or before commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665
Check Version:
git log --oneline -1
Verify Fix Applied:
Test the SlideController delete function with SQL injection payloads to confirm they're blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple delete requests to SlideController with suspicious parameters
Network Indicators:
- POST requests to */Admin/Controller/SlideController with SQL injection patterns in parameters
SIEM Query:
source="web_logs" AND uri="*SlideController*" AND (param="*UNION*" OR param="*SELECT*" OR param="*INSERT*" OR param="*DELETE*")