CVE-2025-25994
📋 TL;DR
This SQL injection vulnerability in FeMiner wms 1.0 allows remote attackers to execute arbitrary SQL commands through the date1, date2, and id parameters. Attackers can potentially access, modify, or delete database contents. All users running FeMiner wms 1.0 are affected.
💻 Affected Systems
- FeMiner wms
📦 What is this software?
Feminer Wms by Feminer Wms Project
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, and potential remote code execution if database functions allow it.
Likely Case
Unauthorized access to sensitive information stored in the database, potentially including user credentials, personal data, or business information.
If Mitigated
Limited information disclosure if proper input validation and parameterized queries are implemented.
🎯 Exploit Status
Exploitation requires understanding of SQL injection techniques and the application's database schema. The specific parameters (date1, date2, id) are identified as vulnerable vectors.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check GitHub issue for latest patched version
Vendor Advisory: https://github.com/FeMiner/wms/issues/20
Restart Required: No
Instructions:
1. Check the GitHub issue for available patches or updates. 2. Apply the patch that implements proper input validation and parameterized queries. 3. Test the application functionality after patching.
🔧 Temporary Workarounds
Input Validation Filter
allImplement server-side input validation for date1, date2, and id parameters to reject malicious input
Web Application Firewall Rules
allDeploy WAF rules to block SQL injection patterns targeting the vulnerable parameters
🧯 If You Can't Patch
- Implement network segmentation to restrict access to the vulnerable application
- Deploy a web application firewall with SQL injection detection rules
🔍 How to Verify
Check if Vulnerable:
Test the date1, date2, and id parameters with SQL injection payloads like ' OR '1'='1
Check Version:
Check application version in admin interface or configuration files
Verify Fix Applied:
Retest with SQL injection payloads after patching to ensure they are properly sanitized or rejected
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts or parameter manipulation
Network Indicators:
- HTTP requests containing SQL keywords in date1, date2, or id parameters
- Unusual database query patterns
SIEM Query:
web.url:*date1=* OR web.url:*date2=* OR web.url:*id=* AND (web.url:*SELECT* OR web.url:*UNION* OR web.url:*OR*)