CVE-2025-8311

CRITICAL EXPLOITED

dotCMS >=24.03.22 - SQL Injection

Title source: llm

Description

dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys. The vulnerability was triggered via the sites parameter, which was directly concatenated into a SQL query without proper sanitization. Exploitation allowed an authenticated attacker with low privileges to extract data from database, perform privilege escalation, or trigger denial-of-service conditions. The vulnerability was verified using tools such as SQLMap and confirmed to allow full database exfiltration and potential denial-of-service conditions via crafted payloads. The vulnerability is fixed in the following versions of dotCMS stack: 25.08.14 / 25.07.10-1v2 LTS / 24.12.27v10 LTS / 24.04.24v21 LTS

Exploits (1)

exploitdb WORKING POC
by Matan Sandori (OSCP_ OSEP_ OSWE) · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52431

Scores

CVSS v4 9.4
EPSS 0.0153
EPSS Percentile 81.3%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Details

VulnCheck KEV 2025-09-04
CWE
CWE-89
Status published
Products (1)
dotCMS/dotCMS Cloud Services (dCS) 24.03.22+
Published Sep 04, 2025
Tracked Since Feb 18, 2026