CVE-2025-45819

6.5 MEDIUM

📋 TL;DR

This SQL injection vulnerability in SLiMS 9 Bulian allows attackers to execute arbitrary SQL commands through the author.php module. It affects administrators with access to the vulnerable admin interface, potentially compromising the entire database.

💻 Affected Systems

Products:
  • Senayan Library Management Systems (SLiMS) 9 Bulian
Versions: 9.6.1 and potentially earlier versions
Operating Systems: All platforms running SLiMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to the vulnerable module path admin/modules/master_file/author.php

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, extraction of sensitive information (user credentials, personal data), and potential database manipulation.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and restricted database permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin authentication but SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issue #281 for latest patched version

Vendor Advisory: https://github.com/slims/slims9_bulian/issues/281

Restart Required: No

Instructions:

1. Check the GitHub issue for official patch
2. Update to the latest SLiMS version
3. Apply parameterized query fixes to author.php
4. Validate all user inputs in affected module

🔧 Temporary Workarounds

Input Validation Workaround

all

Add input validation to filter SQL injection attempts

Modify author.php to sanitize all user inputs before database queries

Access Restriction

linux

Temporarily restrict access to vulnerable module

Add .htaccess restriction to admin/modules/master_file/ directory

🧯 If You Can't Patch

  • Implement WAF rules to block SQL injection patterns
  • Restrict database user permissions to minimum required

🔍 How to Verify

Check if Vulnerable:

Test author.php module with SQL injection payloads like ' OR '1'='1

Check Version:

Check SLiMS version in system configuration or about page

Verify Fix Applied:

Verify parameterized queries are implemented and input validation is working

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by author.php access
  • SQL syntax errors in application logs

Network Indicators:

  • POST requests to author.php with SQL keywords
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND uri="*author.php*" AND (query="*UNION*" OR query="*SELECT*" OR query="*INSERT*")

🔗 References

📤 Share & Export