CVE-2025-52390
Saurus · Saurus CMS Community Edition since commit Multiple Products
A critical SQL Injection vulnerability has been identified in the Saurus CMS Community Edition.
Executive summary
A critical SQL Injection vulnerability has been identified in the Saurus CMS Community Edition. This flaw, located in the full-text search functionality, can be exploited by an unauthenticated remote attacker to execute arbitrary commands on the backend database. Successful exploitation could lead to a complete compromise of the database, resulting in data theft, modification, or deletion, and potentially allowing the attacker to take control of the web server.
Vulnerability
The vulnerability exists within the prepareSearchQuery() method located in the FulltextSearch.class.php file. The application fails to properly sanitize or validate user-supplied input submitted to the search function. A remote attacker can craft a malicious search query containing specially designed SQL statements. When the application processes this input to build a database query, the malicious SQL code is executed directly on the database, allowing the attacker to bypass security controls and interact with the database without authorization.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.1, posing a significant risk to the organization. Exploitation can lead to a complete loss of confidentiality, integrity, and availability of the data managed by the CMS. An attacker could exfiltrate sensitive information such as user credentials, customer data, and internal documents. Furthermore, the attacker could modify or delete website content, disrupt business operations, and potentially use the compromised server as a pivot point to attack other systems within the network, leading to severe reputational damage, financial loss, and potential regulatory fines.
Remediation
Immediate Action: The primary remediation is to update all instances of Saurus CMS Community Edition to the latest available version that contains the security patch for this vulnerability. After patching, it is crucial to monitor for any ongoing exploitation attempts and conduct a thorough review of historical web server and application access logs for any suspicious search queries that may indicate a past compromise.
Proactive Monitoring: Implement enhanced logging and monitoring focused on the application's search functionality. Security teams should look for unusual or malformed search queries in web application logs, particularly those containing SQL keywords (e.g., UNION, SELECT, --, SLEEP), special characters, or encoded payloads. Monitor for anomalous outbound network traffic from the database server, which could indicate data exfiltration.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with a robust ruleset configured to block SQL injection attack patterns. Additionally, enforce the principle of least privilege by ensuring the database user account associated with the CMS has the minimum necessary permissions, restricting it from performing administrative actions or accessing sensitive system tables.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical severity (CVSS 9.1) of this vulnerability, we strongly recommend that organizations immediately apply the vendor-supplied patch to all affected Saurus CMS instances. The risk of data compromise and system takeover is substantial. While this CVE is not yet on the CISA KEV list, its high impact and the ease of exploitation for SQL injection flaws make it an attractive target for threat actors. If patching cannot be performed immediately, the compensating controls outlined above, particularly the use of a WAF, should be implemented as a matter of urgency to mitigate risk.