CVE-2025-63608

5.4 MEDIUM

📋 TL;DR

This SQL injection vulnerability in CSZ-CMS allows authenticated administrators to execute arbitrary SQL queries through the Form Builder view functionality. It affects all installations running CSZ-CMS version 1.3.0 or earlier. Attackers with admin credentials can potentially access, modify, or delete database content.

💻 Affected Systems

Products:
  • CSZ-CMS
Versions: <= 1.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to exploit. All installations with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, privilege escalation to system-level access, or full application takeover.

🟠

Likely Case

Unauthorized data access, data manipulation, or extraction of sensitive information from the database.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, restricting SQL execution scope.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin credentials. Public proof-of-concept exists in GitHub repository. Attack complexity is low once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 1.3.0

Vendor Advisory: https://github.com/Huu1j/CSZ_CMS-exploit/blob/main/csz-cms-vulnerability-analysis.md

Restart Required: No

Instructions:

1. Upgrade CSZ-CMS to version newer than 1.3.0. 2. Apply vendor patches if available. 3. Review and update the Form Builder view functionality code.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the field parameter in form viewing functionality.

Implement prepared statements with parameterized queries
Validate field parameter against allowed values

Access Restriction

all

Temporarily restrict or disable the Form Builder view functionality until patched.

Disable form viewing feature in admin panel
Implement IP-based access restrictions for admin functions

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns in the field parameter
  • Enforce principle of least privilege for admin accounts and implement strong authentication controls

🔍 How to Verify

Check if Vulnerable:

Check CSZ-CMS version. If version is 1.3.0 or earlier, the system is vulnerable. Review code for unsanitized field parameter in form viewing functions.

Check Version:

Check CMS admin panel or review package.json/composer.json for version information

Verify Fix Applied:

Verify CSZ-CMS version is greater than 1.3.0. Test form viewing functionality with SQL injection payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by form view access
  • Admin account accessing form view with suspicious parameters

Network Indicators:

  • HTTP requests to form view endpoints containing SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (uri_path="/admin/form/view" OR uri_path LIKE "%/form/view%") AND (param_field CONTAINS "UNION" OR param_field CONTAINS "SELECT" OR param_field CONTAINS "INSERT" OR param_field CONTAINS "DELETE")

🔗 References

📤 Share & Export