CVE-2025-29084

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in CSZ-CMS v1.3.0 allows remote attackers to execute arbitrary SQL commands through the execSqlFile function in Upgrade.php. Attackers can potentially read, modify, or delete database content, and in some configurations execute arbitrary code. All users running CSZ-CMS v1.3.0 are affected.

💻 Affected Systems

Products:
  • CSZ-CMS
Versions: v1.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using the vulnerable Upgrade.php component. The vulnerability requires the execSqlFile function to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including database destruction, sensitive data exfiltration, and remote code execution leading to full server takeover.

🟠

Likely Case

Database manipulation including data theft, privilege escalation, and potential website defacement.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or limited data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires understanding of SQL injection techniques and access to the vulnerable function. The GitHub reference contains exploit details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.3.1 or later

Vendor Advisory: https://github.com/fax77829yz/CSZ_CMS-exploit/blob/main/README.md#cve1

Restart Required: No

Instructions:

1. Backup your database and files. 2. Download the latest CSZ-CMS version from the official repository. 3. Replace the vulnerable Upgrade.php file. 4. Verify the fix by checking the version number.

🔧 Temporary Workarounds

Disable Upgrade.php Access

all

Restrict access to the vulnerable Upgrade.php file to prevent exploitation.

chmod 000 /path/to/CSZ-CMS/Upgrade.php
Add 'Deny from all' to .htaccess for Upgrade.php directory

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all database operations.
  • Apply web application firewall (WAF) rules to block SQL injection patterns.

🔍 How to Verify

Check if Vulnerable:

Check if your CSZ-CMS version is 1.3.0 and if the Upgrade.php file contains the vulnerable execSqlFile function without proper input sanitization.

Check Version:

Check the version in the CSZ-CMS configuration file or admin panel.

Verify Fix Applied:

Verify that the CSZ-CMS version is updated to 1.3.1 or later, and that the Upgrade.php file uses parameterized queries or proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by SQL errors
  • Requests to Upgrade.php with SQL syntax in parameters

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, DROP, etc.) sent to Upgrade.php endpoint

SIEM Query:

source="web_logs" AND (url="*Upgrade.php*" AND (query="*SELECT*" OR query="*UNION*" OR query="*DROP*"))

🔗 References

📤 Share & Export