EUVD-2025-208836

| CVE-2025-67829 CRITICAL
2026-03-18 mitre
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 18, 2026 - 16:15 euvd
EUVD-2025-208836
Analysis Generated
Mar 18, 2026 - 16:15 vuln.today
CVE Published
Mar 18, 2026 - 00:00 nvd
CRITICAL 9.8

Tags

Description

Mura before 10.1.14 allows beanFeed.cfc getQuery sortDirection SQL injection.

Analysis

A SQL injection vulnerability exists in the beanFeed.cfc component of Mura CMS, specifically in the getQuery function's sortDirection parameter, affecting versions prior to 10.1.14. An attacker can inject arbitrary SQL commands through the sortDirection parameter to read, modify, or delete database contents without requiring authentication. The vulnerability is classified as SQL injection (SQLi) and patches are available in version 10.1.14 and later.

Technical Context

Mura CMS is a content management system built on ColdFusion/CFML. The vulnerability resides in the beanFeed.cfc ColdFusion component, which handles feed-related queries. The getQuery function fails to properly sanitize or parameterize the sortDirection input parameter before incorporating it into dynamic SQL queries. This is a classic SQL injection flaw (CWE-89: Improper Neutralization of Special Elements used in an SQL Command) where user-supplied input is concatenated directly into SQL statements without parameterization or escaping. The sortDirection parameter, intended to specify ascending or descending sort order, becomes an attack vector when an attacker supplies malicious SQL syntax instead of expected directional values.

Affected Products

Mura CMS versions prior to 10.1.14 are affected by this vulnerability. The beanFeed.cfc component is part of the core CMS installation. Upgrade guidance and release notes are available in the official Mura documentation at https://docs.murasoftware.com/v10/release-notes/#section-version-1014. All deployments running version 10.1.13 or earlier should be considered at risk.

Remediation

Immediately upgrade Mura CMS to version 10.1.14 or later from the official Mura Software release channels. The patch addresses SQL injection by implementing proper query parameterization in the beanFeed.cfc getQuery function. Verify the upgrade by checking the version displayed in Mura administration panels and test feed functionality post-deployment. As an interim mitigation for systems that cannot be immediately patched, restrict network access to the beanFeed component endpoints to trusted internal networks only, implement a Web Application Firewall (WAF) with SQL injection detection rules, and review access logs for suspicious sortDirection parameter values containing SQL syntax. After patching, conduct a database audit to ensure no unauthorized data access or modifications occurred during the vulnerability window.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: 0

Share

EUVD-2025-208836 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy