CVE-2025-5384

6.3 MEDIUM

📋 TL;DR

CVE-2025-5384 is a critical SQL injection vulnerability in JeeWMS that allows remote attackers to execute arbitrary SQL commands through the /cgAutoListController.do?datagrid endpoint. This affects all JeeWMS installations up to May 4, 2025. Attackers can potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • JeeWMS
Versions: All versions up to 20250504
Operating Systems: All platforms running JeeWMS
Default Config Vulnerable: ⚠️ Yes
Notes: JeeWMS uses rolling releases, so exact version numbers may not be available. All installations before May 4, 2025 are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to RCE chaining.

🟠

Likely Case

Unauthorized data access, data exfiltration, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited. The public issue tracker contains technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 20250504

Vendor Advisory: https://gitee.com/erzhongxmu/JEEWMS/issues/IC5FNV

Restart Required: Yes

Instructions:

1. Update to the latest JeeWMS version after May 4, 2025. 2. Restart the application server. 3. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns targeting /cgAutoListController.do?datagrid

Endpoint Restriction

all

Restrict access to the vulnerable endpoint using network controls or application configuration

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the CgAutoListController function
  • Deploy network segmentation to isolate JeeWMS from critical databases and limit attack surface

🔍 How to Verify

Check if Vulnerable:

Test the /cgAutoListController.do?datagrid endpoint with SQL injection payloads or check if version is before May 4, 2025

Check Version:

Check JeeWMS version in application interface or configuration files

Verify Fix Applied:

Test the endpoint with SQL injection payloads after update and verify they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts after SQL injection attempts
  • Requests to /cgAutoListController.do?datagrid with SQL syntax

Network Indicators:

  • Unusual database connections from application server
  • Large data transfers from database

SIEM Query:

source="jeeWMS" AND (url="*/cgAutoListController.do*" AND (payload="*SELECT*" OR payload="*UNION*" OR payload="*OR*"))

🔗 References

📤 Share & Export