Key Information Summary Vulnerability Overview CVE ID: CVE-2025-52390 Discoverer: Harsh Kothari (@cybertrinch) Severity: Critical Status: Public Release Date: July 30, 2025 Vulnerability Details Affected Component: Saurus CMS Community Edition File: classes/FulltextSearch.class.php Function: prepareSearchQuery() Line Number: L31 Commit: d886e9a8 Access Requirement: None (Unauthenticated) Vulnerability Description A critical unauthenticated SQL injection vulnerability exists in the function, located in , and invoked via the public search interface ( ). User input is directly concatenated into an SQL LIKE clause without any escaping or parameterization, allowing attackers to inject arbitrary SQL queries and gain unauthorized access to sensitive data. Impact Disclosure of sensitive data (e.g., usernames, password hashes) Bypassing access controls or authentication Data manipulation or deletion Potential remote code execution, depending on database configuration and permissions Proof of Concept (PoC) Submit the following payload to the search input: CVSS Score Base Score: 9.1 (Critical) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Recommended Remediation Replace raw SQL string concatenation with prepared statements Sanitize and validate all user-controlled input before use in SQL queries Use a database abstraction layer or ORM library that enforces secure query construction Example Fix Disclosure Timeline References CVE-2025-52390 - MITRE (Pending) Vulnerable Code on GitHub