CVE-2025-10712
Description
A vulnerability was found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This issue affects some unknown processing of the file /index.php/Login/login. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in 07FLYCMS login allows unauthenticated remote attackers to bypass authentication and gain unauthorized access.
Root
Cause The vulnerability exists in the /index.php/Login/login endpoint of 07FLYCMS (also known as 07FLY-CMS and 07FlyCRM) versions up to 20250831. The Username parameter in POST requests is not properly validated or sanitized, allowing SQL injection. The unsanitized input is directly incorporated into backend database queries, enabling attackers to manipulate the query logic [1].
Exploitation
Exploitation requires no authentication and can be performed remotely. An attacker sends a crafted HTTP POST request to the login endpoint with a malicious SQL payload (e.g., 1' or 1=1 --) in the username field and any arbitrary password. The server executes the manipulated query, bypassing the authentication check [1]. The exploit has been publicly disclosed, increasing the risk of widespread attacks.
Impact
Successful exploitation allows an attacker to bypass the legitimate login process and gain unauthorized access to the system without valid credentials. This can lead to full administrative control, enabling attackers to view, modify, or steal sensitive business data such as customer information, sales records, and financial data. Additionally, attackers can alter system configurations and disrupt normal business operations [1].
Mitigation
The vendor was contacted but did not respond, and no official patch or workaround has been released. Users should consider hardening the affected system by implementing input validation and parameterized queries, or migrating to a supported alternative if the product is end-of-life.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.