CVE-2025-15392

6.3 MEDIUM

📋 TL;DR

This CVE describes a SQL injection vulnerability in Kohana KodiCMS's Search API Endpoint. Attackers can remotely exploit this by manipulating the 'keyword' parameter to execute arbitrary SQL commands. All KodiCMS installations up to version 13.82.135 are affected.

💻 Affected Systems

Products:
  • Kohana KodiCMS
Versions: up to 13.82.135
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Search API Endpoint component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion, potentially leading to full system takeover.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information, or database manipulation.

🟢

If Mitigated

Limited impact with proper input validation and database permissions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit is publicly available and can be launched remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider upgrading to any version above 13.82.135 if available, or apply workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for the 'keyword' parameter in the Search API Endpoint.

WAF Rule

all

Deploy a web application firewall rule to block SQL injection patterns targeting the search endpoint.

🧯 If You Can't Patch

  • Disable the Search API Endpoint if not required.
  • Implement network segmentation to restrict access to the vulnerable system.

🔍 How to Verify

Check if Vulnerable:

Check KodiCMS version in admin panel or via file system. If version is 13.82.135 or lower, system is vulnerable.

Check Version:

Check admin panel or examine version files in the KodiCMS installation directory.

Verify Fix Applied:

Verify version is above 13.82.135 or test the Search API Endpoint with SQL injection payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed search attempts with special characters

Network Indicators:

  • HTTP requests to search endpoint with SQL keywords or special characters

SIEM Query:

source="web_logs" AND (url="*search*" OR url="*api*search*") AND (query="*UNION*" OR query="*SELECT*" OR query="*OR*1=1*")

🔗 References

📤 Share & Export