CVE Alert: CVE-2025-11312 – Tipray 厦门天锐科技股份有限公司 – Data Leakage Prevention System 天锐数据泄露防护系统

CVE-2025-11312

HIGHNo exploitation known

A vulnerability was detected in Tipray 厦门天锐科技股份有限公司 Data Leakage Prevention System 天锐数据泄露防护系统 1.0. This affects the function findModulePage of the file findModulePage.do. The manipulation of the argument sort results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (7.3)
Vendor
Tipray 厦门天锐科技股份有限公司
Product
Data Leakage Prevention System 天锐数据泄露防护系统
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-06T00:32:06.297Z
Updated
2025-10-06T00:32:06.297Z

AI Summary Analysis

Risk verdict

Why this matters

Most likely attack path

Who is most exposed

Detection ideas

  • Look for anomalous requests to findModulePage.do with unusual or excessive sort parameters.
  • Monitor for SQL error patterns or database error messages in responses.
  • Correlate spikes in access to the DLP management path with unusual data access patterns or exfiltration indicators.
  • Inspect web server and application logs for repeated injection attempts or non-standard queries.
  • WAF signatures or rules targeting typical SQLi payloads on the affected endpoint.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed version as soon as available; verify patch applicability in a test environment.
  • Implement network access controls: restrict reachability to the DLP management interface; enforce least-privilege access.
  • Deploy input validation and parameterised queries on the affected component; harden logging and error handling to avoid verbose SQL errors.
  • Enable WAF rules to block SQL injection patterns targeting sort parameters; monitor for exploitation indicators.
  • Operational: schedule patch window, perform regression testing, and validate data integrity post-fix. If KEV true or EPSS ≥ 0.5, treat as priority 1. If KEV/EPSS data are missing, proceed with heightened monitoring and interim compensating controls.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.