Cyber Posture

CVE-2025-25221

Critical

Published: 18 February 2025

Published
18 February 2025
Modified
15 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25221 is an SQL injection vulnerability (CWE-89) affecting the LuxCal Web Calendar software in versions prior to 5.3.3M for the MySQL variant and prior to 5.3.3L for the SQLite variant. The flaw resides in the pdf.php component and was published on 2025-02-18 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to delete, alter, or retrieve sensitive information from the underlying database.

Advisories and patches for mitigation are detailed in the referenced sources, including the Japan Vulnerability Notes entry at https://jvn.jp/en/jp/JVN26024080/, the official download page at https://www.luxsoft.eu/?download, and a related forum discussion at https://www.luxsoft.eu/lcforum/viewtopic.php?pid=1984#p1984. Upgrading to the patched versions—5.3.3M for MySQL or 5.3.3L for SQLite—is the primary remediation step.

Details

CWE(s)
CWE-89

Affected Products

luxsoft
luxcal web calendar
≤ 5.3.3l · ≤ 5.3.3m

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing pdf.php component of web calendar software directly enables remote unauthenticated exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References