CVE-2019-25159: CWE-89 SQL Injection in mpedraza2020 Intranet del Monterroso
A vulnerability was found in mpedraza2020 Intranet del Monterroso up to 4.50.0. It has been classified as critical. This affects an unknown part of the file config/cargos.php. The manipulation of the argument dni_profe leads to sql injection. Upgrading to version 4.51.0 is able to address this issue. The identifier of the patch is 678190bee1dfd64b54a2b0e88abfd009e78adce8. It is recommended to upgrade the affected component. The identifier VDB-252717 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2019-25159 is a SQL Injection vulnerability identified in the mpedraza2020 Intranet del Monterroso software, affecting all versions up to 4.50.0. The vulnerability exists in the config/cargos.php file, specifically through the manipulation of the 'dni_profe' parameter. An attacker can exploit this flaw by injecting malicious SQL code via this parameter, which is not properly sanitized or validated before being used in database queries. This can lead to unauthorized access to or modification of the backend database, potentially exposing sensitive information or allowing data corruption. The vulnerability has been assigned a CVSS 3.1 base score of 5.5, indicating a medium severity level. The vector string (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) shows that the attack requires adjacent network access (e.g., VPN or internal network), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a low level. The vendor has addressed the issue in version 4.51.0, and upgrading to this version or later is recommended to remediate the vulnerability. No known exploits are currently reported in the wild, but the presence of a SQL injection vulnerability in an intranet system poses a significant risk if exploited.
Potential Impact
For European organizations using the mpedraza2020 Intranet del Monterroso software, this vulnerability could lead to unauthorized disclosure of internal data, modification of sensitive records, or disruption of intranet services. Since the intranet likely contains employee, operational, or organizational data, exploitation could result in data breaches, loss of data integrity, and potential operational downtime. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, especially in environments with weak internal network segmentation or where VPN access is granted to external users. The medium severity rating suggests moderate risk; however, given the critical nature of intranet systems in business operations, the impact could be amplified if attackers leverage this vulnerability as a foothold for further lateral movement or privilege escalation within the network.
Mitigation Recommendations
European organizations should prioritize upgrading the mpedraza2020 Intranet del Monterroso software to version 4.51.0 or later to apply the official patch. Beyond patching, organizations should implement strict network segmentation to limit access to the intranet system only to authorized users and devices. Employing Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities can provide an additional layer of defense. Regularly audit and sanitize all user inputs, especially parameters like 'dni_profe', to ensure no unsanitized data reaches the database layer. Conduct internal penetration testing focusing on SQL injection vectors to identify any residual vulnerabilities. Finally, monitor database logs and application logs for unusual query patterns or errors that might indicate exploitation attempts.
Affected Countries
Spain, Portugal, Italy, France, Germany
CVE-2019-25159: CWE-89 SQL Injection in mpedraza2020 Intranet del Monterroso
Description
A vulnerability was found in mpedraza2020 Intranet del Monterroso up to 4.50.0. It has been classified as critical. This affects an unknown part of the file config/cargos.php. The manipulation of the argument dni_profe leads to sql injection. Upgrading to version 4.51.0 is able to address this issue. The identifier of the patch is 678190bee1dfd64b54a2b0e88abfd009e78adce8. It is recommended to upgrade the affected component. The identifier VDB-252717 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2019-25159 is a SQL Injection vulnerability identified in the mpedraza2020 Intranet del Monterroso software, affecting all versions up to 4.50.0. The vulnerability exists in the config/cargos.php file, specifically through the manipulation of the 'dni_profe' parameter. An attacker can exploit this flaw by injecting malicious SQL code via this parameter, which is not properly sanitized or validated before being used in database queries. This can lead to unauthorized access to or modification of the backend database, potentially exposing sensitive information or allowing data corruption. The vulnerability has been assigned a CVSS 3.1 base score of 5.5, indicating a medium severity level. The vector string (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) shows that the attack requires adjacent network access (e.g., VPN or internal network), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a low level. The vendor has addressed the issue in version 4.51.0, and upgrading to this version or later is recommended to remediate the vulnerability. No known exploits are currently reported in the wild, but the presence of a SQL injection vulnerability in an intranet system poses a significant risk if exploited.
Potential Impact
For European organizations using the mpedraza2020 Intranet del Monterroso software, this vulnerability could lead to unauthorized disclosure of internal data, modification of sensitive records, or disruption of intranet services. Since the intranet likely contains employee, operational, or organizational data, exploitation could result in data breaches, loss of data integrity, and potential operational downtime. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, especially in environments with weak internal network segmentation or where VPN access is granted to external users. The medium severity rating suggests moderate risk; however, given the critical nature of intranet systems in business operations, the impact could be amplified if attackers leverage this vulnerability as a foothold for further lateral movement or privilege escalation within the network.
Mitigation Recommendations
European organizations should prioritize upgrading the mpedraza2020 Intranet del Monterroso software to version 4.51.0 or later to apply the official patch. Beyond patching, organizations should implement strict network segmentation to limit access to the intranet system only to authorized users and devices. Employing Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities can provide an additional layer of defense. Regularly audit and sanitize all user inputs, especially parameters like 'dni_profe', to ensure no unsanitized data reaches the database layer. Conduct internal penetration testing focusing on SQL injection vectors to identify any residual vulnerabilities. Finally, monitor database logs and application logs for unusual query patterns or errors that might indicate exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-02-02T13:41:43.602Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec2f8
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 6:39:31 PM
Last updated: 8/16/2025, 5:39:21 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.