CVE-2025-50567

10.0 CRITICAL

📋 TL;DR

Saurus CMS Community Edition 4.7.1 contains a critical SQL injection vulnerability in the DB::prepare() function due to improper use of preg_replace() with the deprecated /e modifier. This allows attackers to inject arbitrary SQL statements, potentially leading to remote code execution. All users running the vulnerable version are affected.

💻 Affected Systems

Products:
  • Saurus CMS Community Edition
Versions: 4.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the core DB::prepare() function, affecting all installations of this version.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with arbitrary PHP code execution, data theft, and potential lateral movement within the network.

🟠

Likely Case

Database compromise leading to data exfiltration, privilege escalation, and potential website defacement.

🟢

If Mitigated

Limited impact if proper input validation and WAF rules are in place, though risk remains due to eval-based execution.

🌐 Internet-Facing: HIGH - Web applications are typically internet-facing, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal systems could be targeted through phishing or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a core database function, making exploitation straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://saurus.com

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If patch available, download and apply. 3. Test functionality after patching.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement strict input validation for all user-supplied parameters before they reach DB::prepare()

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns and eval() function usage

🧯 If You Can't Patch

  • Isolate the Saurus CMS instance behind a reverse proxy with strict input filtering
  • Implement network segmentation to limit database access from the web application

🔍 How to Verify

Check if Vulnerable:

Check if running Saurus CMS Community Edition version 4.7.1 by examining version files or admin panel

Check Version:

Check includes/version.php or admin panel system information

Verify Fix Applied:

Verify version has been updated beyond 4.7.1 or check if DB::prepare() function no longer uses preg_replace() with /e modifier

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries with eval() patterns
  • Multiple failed SQL injection attempts
  • Unexpected PHP execution in database logs

Network Indicators:

  • SQL injection payloads in HTTP requests
  • Unusual outbound database connections from web server

SIEM Query:

source="web_logs" AND ("preg_replace.*/e" OR "eval(" OR "UNION SELECT")

🔗 References

📤 Share & Export