CVE-2025-46154

8.4 HIGH

📋 TL;DR

Foxcms v1.25 contains a SQL time-based injection vulnerability in the installdb.php file's dbname parameter. This allows attackers to execute arbitrary SQL queries by manipulating database connection requests during installation. Only systems running the vulnerable Foxcms version are affected.

💻 Affected Systems

Products:
  • Foxcms
Versions: v1.25
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the installation script, affecting fresh installations and potentially systems where installation files weren't removed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, or potential remote code execution through database functions.

🟠

Likely Case

Database information disclosure, data extraction, and potential privilege escalation within the database.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL time-based injection requires no authentication and has public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Remove or restrict access to installdb.php after installation completes.

🔧 Temporary Workarounds

Remove installation files

linux

Delete or restrict access to the vulnerable installdb.php file after installation

rm /path/to/foxcms/installdb.php
chmod 000 /path/to/foxcms/installdb.php

Input validation

all

Add parameter validation to dbname parameter in installdb.php

🧯 If You Can't Patch

  • Remove or disable the installdb.php file after installation
  • Implement web application firewall rules to block SQL injection patterns

🔍 How to Verify

Check if Vulnerable:

Check if installdb.php exists and is accessible. Test with time-based SQL injection payloads against the dbname parameter.

Check Version:

Check Foxcms version in configuration files or admin panel

Verify Fix Applied:

Confirm installdb.php is removed or inaccessible. Test with SQL injection payloads that should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to installdb.php with SQL keywords
  • Long response times from installdb.php requests

Network Indicators:

  • HTTP POST requests to installdb.php containing SQL syntax like SLEEP(), BENCHMARK(), or WAITFOR

SIEM Query:

source="web_logs" AND uri="/installdb.php" AND (request_body CONTAINS "SLEEP" OR request_body CONTAINS "BENCHMARK" OR request_body CONTAINS "WAITFOR")

🔗 References

📤 Share & Export