CVE-2025-2351

7.3 HIGH

📋 TL;DR

A critical SQL injection vulnerability in DayCloud StudentManage 1.0 allows remote attackers to execute arbitrary SQL commands via the query parameter in the /admin/adminScoreUrl login endpoint. This can lead to unauthorized data access, modification, or deletion. All users of DayCloud StudentManage 1.0 are affected.

💻 Affected Systems

Products:
  • DayCloud StudentManage
Versions: 1.0
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /admin/adminScoreUrl login endpoint specifically. Rolling release model means exact vulnerable versions are unclear.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining.

🟠

Likely Case

Unauthorized access to student records, grade manipulation, or administrative credential theft.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit disclosed publicly but requires login to admin endpoint. SQL injection via query parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor unresponsive. Consider alternative solutions or implement workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF with SQL injection rules to block malicious requests to /admin/adminScoreUrl.

Input Validation Filter

all

Implement server-side input validation to sanitize query parameter before processing.

🧯 If You Can't Patch

  • Isolate the StudentManage system from internet access and restrict to internal network only.
  • Implement strict network segmentation and monitor all traffic to /admin/adminScoreUrl endpoint.

🔍 How to Verify

Check if Vulnerable:

Test /admin/adminScoreUrl endpoint with SQL injection payloads in query parameter (e.g., ' OR '1'='1).

Check Version:

Check application version in admin panel or configuration files.

Verify Fix Applied:

Verify input validation prevents SQL injection by testing with malicious payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts to /admin/adminScoreUrl
  • Suspicious query parameter values

Network Indicators:

  • HTTP requests to /admin/adminScoreUrl with SQL keywords in parameters
  • Unexpected database connection patterns

SIEM Query:

source="web_logs" AND uri="/admin/adminScoreUrl" AND (param="query" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR")

🔗 References

📤 Share & Export