<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Matrimony-Cms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/matrimony-cms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/matrimony-cms/feed.xml" rel="self" type="application/rss+xml"/><item><title>Zeeways Matrimony CMS Unauthenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-zeeways-sql-injection/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-zeeways-sql-injection/</guid><description>Zeeways Matrimony CMS is vulnerable to SQL injection via the profile_list endpoint, where an unauthenticated attacker can inject SQL code via the up_cast, s_mother, and s_religion parameters, potentially allowing them to extract sensitive information.</description><content:encoded><![CDATA[<p>Zeeways Matrimony CMS is susceptible to SQL injection vulnerabilities affecting the profile_list endpoint. This vulnerability allows unauthenticated attackers to inject malicious SQL code through the <code>up_cast</code>, <code>s_mother</code>, and <code>s_religion</code> parameters. Successful exploitation could lead to unauthorized access to sensitive data within the database. The vulnerability was reported in CVE-2019-25635. The vulnerable software is Zeeways Matrimony CMS, and it&rsquo;s crucial for organizations using this CMS to apply necessary patches or mitigations to prevent potential data breaches. Defenders should prioritize monitoring web server logs for suspicious activity targeting these specific parameters and the <code>profile_list</code> endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Zeeways Matrimony CMS instance.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>profile_list</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>up_cast</code>, <code>s_mother</code>, or <code>s_religion</code> parameters of the HTTP request.</li>
<li>The web server processes the request and executes the injected SQL code against the database.</li>
<li>Depending on the injected SQL, the attacker can extract sensitive information from the database, such as user credentials or personal details, using time-based or error-based techniques.</li>
<li>The attacker analyzes the extracted data to identify valuable information.</li>
<li>The attacker may use the extracted credentials to further compromise the system or access other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to a full database compromise, potentially exposing sensitive user data including personal information, credentials, and financial details. This can result in significant reputational damage, financial losses due to regulatory fines, and legal repercussions for organizations using the vulnerable Zeeways Matrimony CMS. The impact is high due to the ease of exploitation (unauthenticated) and the potential for complete data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious HTTP requests targeting the <code>/profile_list</code> endpoint with SQL injection attempts in the <code>up_cast</code>, <code>s_mother</code>, and <code>s_religion</code> parameters (see IOC table and enable webserver logging).</li>
<li>Apply available patches or updates for Zeeways Matrimony CMS to address CVE-2019-25635.</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts targeting the specified parameters in the URL.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially for parameters used in database queries to prevent future SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>matrimony-cms</category></item></channel></rss>