CVE-2025-6100

6.3 MEDIUM

📋 TL;DR

This critical SQL injection vulnerability in realguoshuai open-video-cms 1.0 allows remote attackers to execute arbitrary SQL commands via the 'sort' parameter in the /v1/video/list endpoint. Attackers can potentially read, modify, or delete database content, and in some cases achieve remote code execution. All deployments of open-video-cms 1.0 with the vulnerable endpoint exposed are affected.

💻 Affected Systems

Products:
  • realguoshuai open-video-cms
Versions: 1.0
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation. Any deployment with the /v1/video/list endpoint accessible is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, and potential remote code execution on the underlying server.

🟠

Likely Case

Database information disclosure, data manipulation, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or partial data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists, making exploitation straightforward for attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: none

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block SQL injection patterns in the 'sort' parameter

Input Validation Filter

all

Add server-side validation to restrict 'sort' parameter to safe values only

🧯 If You Can't Patch

  • Block external access to the /v1/video/list endpoint using network ACLs or firewall rules
  • Implement database user with minimal permissions (read-only if possible) for the application

🔍 How to Verify

Check if Vulnerable:

Test the /v1/video/list endpoint with SQL injection payloads in the 'sort' parameter (e.g., sort=1' OR '1'='1)

Check Version:

Check application configuration files or package manager for version information

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and return appropriate error messages or sanitized responses

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple requests with SQL-like patterns in 'sort' parameter
  • Database connection errors

Network Indicators:

  • HTTP requests to /v1/video/list with SQL keywords in parameters
  • Unusual database traffic patterns

SIEM Query:

source="web_logs" AND uri="/v1/video/list" AND (param="sort" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|exec|or|and)")

🔗 References

📤 Share & Export