CVE-2025-14012

4.7 MEDIUM

📋 TL;DR

This SQL injection vulnerability in JIZHICMS allows attackers to execute arbitrary SQL commands through the batch comment deletion functionality. Attackers can potentially read, modify, or delete database content. All JIZHICMS installations up to version 2.5.5 are affected.

💻 Affected Systems

Products:
  • JIZHICMS
Versions: up to 2.5.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin panel access for exploitation based on the vulnerable endpoint path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, or potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized access to comment data, user information, or other database tables accessible to the application's database user.

🟢

If Mitigated

Limited impact if database user has minimal permissions and proper input validation is enforced at other layers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available in GitHub repository. Requires authentication to admin panel (/index.php/admins/).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider upgrading if vendor releases fix, or implement workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Add parameter validation to filter SQL injection attempts in the deleteAll/findAll/delete functions

Modify /index.php/admins/Comment/deleteAll.html to validate 'data' parameter using prepared statements or strict type checking

WAF Rule

all

Implement web application firewall rules to block SQL injection patterns

Add WAF rule: Detect and block SQL keywords in POST parameters to /index.php/admins/Comment/deleteAll.html

🧯 If You Can't Patch

  • Restrict access to admin panel using IP whitelisting or VPN
  • Implement database user with minimal required permissions (read-only where possible)

🔍 How to Verify

Check if Vulnerable:

Check if JIZHICMS version is ≤2.5.5 and review /index.php/admins/Comment/deleteAll.html for lack of parameter validation

Check Version:

Check JIZHICMS configuration files or admin panel for version information

Verify Fix Applied:

Test the deleteAll functionality with SQL injection payloads to confirm they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple DELETE/SELECT queries from single admin session
  • Requests to /index.php/admins/Comment/deleteAll.html with suspicious parameters

Network Indicators:

  • POST requests to vulnerable endpoint containing SQL keywords (UNION, SELECT, DELETE, etc.)

SIEM Query:

source="web_logs" AND uri="/index.php/admins/Comment/deleteAll.html" AND (param="data" CONTAINS "UNION" OR param="data" CONTAINS "SELECT" OR param="data" CONTAINS "DELETE")

🔗 References

📤 Share & Export