CVE-2025-13783

6.3 MEDIUM

📋 TL;DR

This CVE describes a SQL injection vulnerability in taosir WTCMS's comment administration component. Attackers can remotely exploit this flaw by manipulating comment IDs to execute arbitrary SQL commands. All installations up to commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665 are affected.

💻 Affected Systems

Products:
  • taosir WTCMS
Versions: All versions up to commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Rolling release model means specific version numbers are unavailable. All installations before the fix commit are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, or full system takeover via SQL injection escalation.

🟠

Likely Case

Unauthorized data access, comment manipulation, or privilege escalation through SQL injection.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires comment administration access. Public exploit code exists according to references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize comment ID parameters before processing

# Modify application/Comment/Controller/CommentadminController.class.php
# Add parameter validation for 'ids' parameter before SQL execution

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns

# Example ModSecurity rule:
# SecRule ARGS:ids "@detectSQLi" "id:1001,phase:2,deny,status:403"

🧯 If You Can't Patch

  • Restrict access to comment administration interface to trusted IP addresses only
  • Implement database monitoring to detect unusual SQL query patterns

🔍 How to Verify

Check if Vulnerable:

Check if your installation uses commit 01a5f68a3dfc2fdddb44eed967bb2d4f60487665 or earlier in the CommentadminController.class.php file

Check Version:

git log --oneline -1 application/Comment/Controller/CommentadminController.class.php

Verify Fix Applied:

Verify that input validation has been added to the 'ids' parameter handling in CommentadminController.class.php

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple comment administration requests with SQL-like patterns in 'ids' parameter

Network Indicators:

  • HTTP POST requests to comment administration endpoints with suspicious 'ids' parameter values

SIEM Query:

source="web_logs" AND uri="/comment/admin" AND (ids CONTAINS "'" OR ids CONTAINS "--" OR ids CONTAINS "SELECT")

🔗 References

📤 Share & Export