SQL Injection Vulnerability in DeerWMS by DeerWMS
CVE-2025-8161

5.3MEDIUM

Key Information:

Vendor

Deerwms

Vendor
CVE Published:
25 July 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-8161?

A security flaw exists in the DeerWMS product, specifically affecting versions up to 3.3. The vulnerability involves the improper handling of the parameters in the file /system/role/export, particularly the params[dataScope] argument. Malicious actors can exploit this vulnerability to perform SQL injection attacks remotely, leading to unauthorized data access and manipulation. This exploit is well-documented and poses a significant risk to systems running the affected versions of DeerWMS.

Affected Version(s)

deer-wms-2 3.0

deer-wms-2 3.1

deer-wms-2 3.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ZAST.AI (VulDB User)
.
CVE-2025-8161 : SQL Injection Vulnerability in DeerWMS by DeerWMS