CVE-2025-45819
📋 TL;DR
This SQL injection vulnerability in SLiMS 9 Bulian allows attackers to execute arbitrary SQL commands through the author.php module. It affects administrators with access to the vulnerable admin interface, potentially compromising the entire database.
💻 Affected Systems
- Senayan Library Management Systems (SLiMS) 9 Bulian
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution via database functions.
Likely Case
Unauthorized data access, extraction of sensitive information (user credentials, personal data), and potential database manipulation.
If Mitigated
Limited impact with proper input validation, parameterized queries, and restricted database permissions.
🎯 Exploit Status
Exploitation requires admin authentication but SQL injection is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check GitHub issue #281 for latest patched version
Vendor Advisory: https://github.com/slims/slims9_bulian/issues/281
Restart Required: No
Instructions:
1. Check the GitHub issue for official patch
2. Update to the latest SLiMS version
3. Apply parameterized query fixes to author.php
4. Validate all user inputs in affected module
🔧 Temporary Workarounds
Input Validation Workaround
allAdd input validation to filter SQL injection attempts
Modify author.php to sanitize all user inputs before database queries
Access Restriction
linuxTemporarily restrict access to vulnerable module
Add .htaccess restriction to admin/modules/master_file/ directory
🧯 If You Can't Patch
- Implement WAF rules to block SQL injection patterns
- Restrict database user permissions to minimum required
🔍 How to Verify
Check if Vulnerable:
Test author.php module with SQL injection payloads like ' OR '1'='1
Check Version:
Check SLiMS version in system configuration or about page
Verify Fix Applied:
Verify parameterized queries are implemented and input validation is working
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts followed by author.php access
- SQL syntax errors in application logs
Network Indicators:
- POST requests to author.php with SQL keywords
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND uri="*author.php*" AND (query="*UNION*" OR query="*SELECT*" OR query="*INSERT*")