CVE-2025-14780

6.3 MEDIUM

📋 TL;DR

This SQL injection vulnerability in Xiongwei Smart Catering Cloud Platform allows remote attackers to execute arbitrary SQL commands through the filter parameter of the /dishtrade/dish_trade_detail_get endpoint. Organizations using version 2.1.6446.28761 of this catering management software are affected. The vulnerability enables attackers to potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • Xiongwei Smart Catering Cloud Platform
Versions: 2.1.6446.28761
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the web interface component and requires the /dishtrade/dish_trade_detail_get endpoint to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including theft of sensitive customer data, financial records, and administrative credentials, potentially leading to data destruction or ransomware deployment.

🟠

Likely Case

Data exfiltration of customer information, menu pricing data, and operational records, with potential for privilege escalation within the application.

🟢

If Mitigated

Limited impact due to proper input validation, parameterized queries, and database permission restrictions preventing unauthorized data access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and requires minimal technical skill to execute against vulnerable systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Contact Xiongwei vendor for patch availability. If no patch exists, implement workarounds immediately.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block SQL injection patterns targeting the /dishtrade/dish_trade_detail_get endpoint

Network Access Control

all

Restrict access to the vulnerable endpoint using firewall rules or reverse proxy configurations

🧯 If You Can't Patch

  • Isolate the affected system from the internet and restrict access to authorized users only
  • Implement database monitoring and alerting for unusual SQL query patterns

🔍 How to Verify

Check if Vulnerable:

Test the /dishtrade/dish_trade_detail_get endpoint with SQL injection payloads in the filter parameter

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that parameterized queries are implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts following SQL injection patterns
  • Unusual database query patterns from web application user

Network Indicators:

  • HTTP requests to /dishtrade/dish_trade_detail_get with SQL keywords in parameters
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND uri="/dishtrade/dish_trade_detail_get" AND (param="filter" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "INSERT" OR value CONTAINS "DELETE")

🔗 References

📤 Share & Export