CVE-2025-1535

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Baiyi Cloud Asset Management System allows remote attackers to execute arbitrary SQL commands by manipulating the ticket_id parameter in the /wuser/admin.ticket.close.php endpoint. This could lead to data theft, modification, or deletion. All users running the affected version are at risk.

💻 Affected Systems

Products:
  • Baiyi Cloud Asset Management System
Versions: 8.142.100.161
Operating Systems: Any OS running the application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the specific PHP file mentioned and requires the application to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or system takeover via SQL injection to execute arbitrary commands.

🟠

Likely Case

Unauthorized access to sensitive asset management data, user credentials, or configuration information through SQL injection.

🟢

If Mitigated

Limited impact with proper input validation and WAF rules blocking malicious SQL patterns.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and the exploit is publicly disclosed.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or network-accessible attacks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor did not respond to disclosure

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider workarounds or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the ticket_id parameter in admin.ticket.close.php

Modify PHP code to use prepared statements: $stmt = $conn->prepare('UPDATE tickets SET status = ? WHERE id = ?'); $stmt->bind_param('si', $status, $ticket_id);

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint

Add WAF rule: Block requests to /wuser/admin.ticket.close.php containing SQL keywords in ticket_id parameter

🧯 If You Can't Patch

  • Network segmentation to isolate the asset management system from critical networks
  • Implement strict access controls and monitor all access to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if your system runs Baiyi Cloud Asset Management System version 8.142.100.161 and has the /wuser/admin.ticket.close.php file accessible.

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Test the vulnerable endpoint with SQL injection payloads to confirm they are properly blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts following SQL injection patterns
  • Unexpected database queries from the application

Network Indicators:

  • HTTP requests to /wuser/admin.ticket.close.php with SQL keywords in parameters
  • Unusual database traffic patterns

SIEM Query:

source="web_logs" AND uri="/wuser/admin.ticket.close.php" AND (param="ticket_id" AND value MATCH "'.*[UNION|SELECT|INSERT|UPDATE|DELETE|DROP].*')"

🔗 References

📤 Share & Export