CVE-2025-11902
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-17

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in yanyutao0402 ChanCMS up to 3.3.2. Affected by this vulnerability is the function findField of the file /cms/article/findField. Performing a manipulation of the argument cid results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-17
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
chancms chancms to 3.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a SQL Injection flaw in yanyutao0402 ChanCMS versions up to 3.3.2. It occurs in the function findField located at /cms/article/findField, where the cid parameter is not properly validated. An attacker can remotely manipulate this cid argument to inject malicious SQL commands, potentially altering the database queries executed by the system. The vulnerability can be exploited without authentication, and a public proof-of-concept exploit exists. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by compromising the confidentiality, integrity, and availability of your system. An attacker exploiting the SQL injection can access, modify, or delete sensitive data stored in the database. Additionally, the system's availability may be affected due to malicious queries. The vulnerability can be exploited remotely without authentication, increasing the risk of unauthorized access and control over the affected system. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the endpoint /cms/article/findField with manipulated cid parameters to check for SQL injection. For example, sending requests with SQL injection payloads in the cid parameter and observing unexpected database errors or data leakage can indicate the vulnerability. A simple command using curl could be: curl -v 'http://<target>/cms/article/findField?cid=8 OR 1=1' to see if the response differs or reveals data. Additionally, scanning for the presence of ChanCMS version up to 3.3.2 and checking for weak default backend credentials (username: chancms, password: 123456) at /public/admin/index.html can help detect vulnerable systems. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include fixing the parameter validation in the findField function to properly sanitize and neutralize the cid input to prevent SQL injection. If possible, upgrade ChanCMS to a version beyond 3.3.2 that addresses this vulnerability. Since no official vendor patch or mitigation is available, consider replacing the affected product. Also, change any weak default backend credentials to strong, unique passwords to prevent unauthorized access. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart