dotCMS versions 24.03.22 and after, identified a Boolean...
Moderate severity
Unreviewed
Published
Sep 4, 2025
to the GitHub Advisory Database
•
Updated Sep 4, 2025
Description
Published by the National Vulnerability Database
Sep 4, 2025
Published to the GitHub Advisory Database
Sep 4, 2025
Last updated
Sep 4, 2025
dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys.
The vulnerability was triggered via the sites parameter, which was directly concatenated into a SQL query without proper sanitization.
Exploitation allowed an authenticated attacker with low privileges to extract data from database, perform privilege escalation, or trigger denial-of-service conditions.
The vulnerability was verified using tools such as SQLMap and confirmed to allow full database exfiltration and potential denial-of-service conditions via crafted payloads.
The vulnerability is fixed in the following versions of dotCMS stack: 25.08.14 / 25.07.10-1v2 LTS / 24.12.27v10 LTS / 24.04.24v21 LTS
References