VYPR
High severity7.3NVD Advisory· Published Oct 27, 2025· Updated Apr 29, 2026

CVE-2025-12248

CVE-2025-12248

Description

A security vulnerability has been detected in CLTPHP 3.0. The affected element is an unknown function of the file /home/search.html. Such manipulation of the argument keyword leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A Boolean-based blind SQL injection vulnerability exists in CLTPHP 3.0's /home/search.html via the 'keyword' parameter, allowing remote, unauthenticated extraction of sensitive database data.

Root

Cause

The CLTPHP Content Management System version 3.0 contains a Boolean-based blind SQL injection vulnerability in the /home/search.html endpoint. The root cause is insufficient validation and sanitization of the user-controlled keyword parameter, which is directly incorporated into SQL queries without proper escaping or parameterization. This allows an attacker to inject arbitrary SQL conditions and observe differences in application responses (e (e.g., page content or behavior) to infer the truth value of injected conditions [1].

Exploitability

The attack is remotely exploitable without authentication. An attacker only needs to send specially crafted HTTP requests to the /home/search.html endpoint with a manipulated keyword argument. Because the vulnerability is blind (Boolean-based), the attacker uses a series of true/false conditions to extract queries to enumerate database contents one character at a time, making the attack methodical but fully automated with tools [1].

Impact

Successful exploitation allows an attacker to extract sensitive database information such as the database name, table and column structures, and user credentials (including hashed passwords). If the database account used by the application has write privileges, the attacker could also manipulate or delete data, bypass authentication, or disrupt service continuity [1].

Mitigation

Status

As of the publication date (2025-10-27), no official patch or fixed version has been announced by the vendor. The vulnerability has been publicly disclosed and an exploit demonstration is available [1]. Organizations using CLTPHP 3.0 should immediately restrict network access to the vulnerable endpoint, apply input validation filtering, or consider migrating to a supported alternative until a fix is released.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.