CVE-2025-7156

6.3 MEDIUM

📋 TL;DR

CVE-2025-7156 is a critical SQL injection vulnerability in hitsz-ids airda version 0.0.3 that allows remote attackers to execute arbitrary SQL commands via the 'question' parameter in the /v1/chat/completions endpoint. This affects all deployments of hitsz-ids airda 0.0.3, potentially exposing database contents and enabling data manipulation.

💻 Affected Systems

Products:
  • hitsz-ids airda
Versions: 0.0.3
Operating Systems: All platforms running hitsz-ids airda
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of version 0.0.3 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, modification, or deletion; potential remote code execution if database functions allow it; full system takeover.

🟠

Likely Case

Unauthorized data access and extraction from the database, potentially exposing sensitive information stored in the airda application.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries in place, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via the /v1/chat/completions endpoint which is typically exposed for API access.
🏢 Internal Only: MEDIUM - Internal deployments are still vulnerable but have reduced attack surface compared to internet-facing instances.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed, making weaponization likely. The SQL injection is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the 'question' parameter in the execute function.

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block SQL injection patterns targeting the /v1/chat/completions endpoint.

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to the vulnerable endpoint
  • Deploy a reverse proxy with request filtering to block malicious SQL injection payloads

🔍 How to Verify

Check if Vulnerable:

Check if running hitsz-ids airda version 0.0.3. Test the /v1/chat/completions endpoint with SQL injection payloads in the 'question' parameter.

Check Version:

Check package.json or application configuration for version information

Verify Fix Applied:

Verify that SQL injection payloads no longer execute and that parameterized queries are implemented in the execute function.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Error messages containing SQL syntax from the execute function
  • Multiple failed login attempts or unusual parameter values

Network Indicators:

  • HTTP POST requests to /v1/chat/completions with SQL keywords in parameters
  • Unusual database connection patterns from the application server

SIEM Query:

source="application_logs" AND ("SQL syntax" OR "execute function" OR "question parameter") AND status=500

🔗 References

📤 Share & Export