CVE-2025-10351: Melis Platform CMS SQL Injection
N/A
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| melisplatform/melis-cms | composer | < 5.3.4 | 5.3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis of the security patch (commit 42d36326d9f6400b91db574483add2747af1db21) provides clear evidence of the vulnerability. The patch was applied to the src/Controller/PageEditionController.php file, specifically within the getTinyTemplatesAction function. The added code explicitly checks if the $idPage parameter is null, empty, or non-numeric. This indicates that prior to this change, the parameter was likely passed to a database query without sufficient validation, which is the root cause of the SQL injection vulnerability as described. The vulnerability description directly implicates the 'idPage' parameter and the '/melis/MelisCms/PageEdition/getTinyTemplates' endpoint, which corresponds to the getTinyTemplatesAction method in the PageEditionController. Therefore, this function is the direct entry point for the exploit.
Vulnerable functions
PageEditionController::getTinyTemplatesActionsrc/Controller/PageEditionController.php