CVE-2025-70311

MEDIUM6.5/ 10.0
Share:
Published: February 3, 2026 at 06:16 PM
Modified: February 18, 2026 at 04:24 PM
Source: cve@mitre.org

Vulnerability Description

JEEWMS 1.0 is vulnerable to SQL Injection. Attackers can inject malicious SQL statements through the id1 and id2 parameters in the /systemControl.do interface for attack.

CVSS Metrics

Base Score
6.5
Severity
MEDIUM
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Weaknesses (CWE)

Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

JEEWMS 1.0 suffers from a critical SQL Injection vulnerability, allowing attackers to execute arbitrary SQL commands. This flaw, exploitable through the /systemControl.do interface, enables complete database compromise, potentially leading to data exfiltration, system takeover, and significant business disruption.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious SQL payload designed to exploit the vulnerability. This payload is typically designed to extract sensitive information, bypass authentication, or execute arbitrary commands on the database server.

Step 2: Request Construction: The attacker constructs a specially crafted HTTP request targeting the /systemControl.do interface. This request includes the malicious SQL payload within the id1 and/or id2 parameters.

Step 3: Server-Side Processing: The JEEWMS application receives the HTTP request and processes the id1 and id2 parameters. Due to the lack of input validation, the application directly incorporates the attacker's payload into a SQL query.

Step 4: SQL Execution: The database server executes the modified SQL query, which now includes the attacker's malicious code.

Step 5: Result Retrieval (and Exploitation): The database server returns the results of the executed SQL query. Depending on the payload, this could include sensitive data, authentication bypass, or other unauthorized actions. The attacker then analyzes the response to confirm successful exploitation and potentially exfiltrate data or gain further access.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and sanitization of the id1 and id2 parameters within the /systemControl.do interface. The application directly incorporates these user-supplied parameters into SQL queries without proper escaping or filtering. This allows an attacker to inject malicious SQL code, altering the intended query logic and enabling unauthorized database access. The root cause is a failure to implement parameterized queries or prepared statements, which would prevent the interpretation of user-supplied input as executable SQL code. The lack of input validation allows for the injection of SQL commands like UNION SELECT, DROP TABLE, or SELECT @@version to achieve various malicious objectives. The absence of a Web Application Firewall (WAF) or other security measures further exacerbates the risk.

CVE-2025-70311 - MEDIUM Severity (6.5) | Free CVE Database | 4nuxd