CVE-2024-0344: CWE-89 SQL Injection in soxft TimeMail
A vulnerability, which was classified as critical, has been found in soxft TimeMail up to 1.1. Affected by this issue is some unknown functionality of the file check.php. The manipulation of the argument c leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250112.
AI Analysis
Technical Summary
CVE-2024-0344 is a SQL Injection vulnerability identified in the soxft TimeMail application, specifically affecting versions up to 1.1. The vulnerability resides in the check.php file, where the argument 'c' is improperly sanitized, allowing an attacker to inject malicious SQL code. This type of injection can manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been publicly disclosed, though no known exploits are currently observed in the wild. The CVSS 3.1 base score is 5.5, indicating a medium severity level. The vector details (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) show that the attack requires adjacent network access (e.g., local network), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a low level, suggesting limited but non-negligible risk. The vulnerability is classified under CWE-89, which is a common and well-understood injection flaw that can be mitigated with proper input validation and parameterized queries. No patches have been linked yet, indicating that users of TimeMail versions 1.0 and 1.1 remain vulnerable until an update is released or mitigations are applied.
Potential Impact
For European organizations using soxft TimeMail versions 1.0 or 1.1, this vulnerability poses a risk of unauthorized access to sensitive email or scheduling data stored in backend databases. While the attack requires local or adjacent network access and low privileges, it could be exploited by insider threats or attackers who have gained limited access to the internal network. The potential impact includes data leakage, unauthorized data modification, and service disruption, which can affect business continuity and data privacy compliance obligations such as GDPR. Organizations relying on TimeMail for critical communications or scheduling may face operational disruptions or reputational damage if exploited. Given the medium severity and the absence of known active exploits, the immediate risk is moderate but should not be underestimated, especially in environments with less stringent network segmentation or insider threat controls.
Mitigation Recommendations
European organizations should immediately audit their use of soxft TimeMail and identify any deployments of versions 1.0 or 1.1. Until a vendor patch is available, mitigation should focus on restricting access to the affected check.php functionality by implementing strict network segmentation and firewall rules to limit access to trusted hosts only. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'c' parameter can reduce exploitation risk. Organizations should also conduct code reviews or implement input validation and parameterized queries if they maintain custom or extended versions of TimeMail. Monitoring logs for unusual database query patterns or failed injection attempts can provide early detection. Finally, organizations should engage with soxft for timely patch releases and plan for prompt updates once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2024-0344: CWE-89 SQL Injection in soxft TimeMail
Description
A vulnerability, which was classified as critical, has been found in soxft TimeMail up to 1.1. Affected by this issue is some unknown functionality of the file check.php. The manipulation of the argument c leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250112.
AI-Powered Analysis
Technical Analysis
CVE-2024-0344 is a SQL Injection vulnerability identified in the soxft TimeMail application, specifically affecting versions up to 1.1. The vulnerability resides in the check.php file, where the argument 'c' is improperly sanitized, allowing an attacker to inject malicious SQL code. This type of injection can manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vulnerability has been publicly disclosed, though no known exploits are currently observed in the wild. The CVSS 3.1 base score is 5.5, indicating a medium severity level. The vector details (AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) show that the attack requires adjacent network access (e.g., local network), low attack complexity, and low privileges but no user interaction. The impact affects confidentiality, integrity, and availability at a low level, suggesting limited but non-negligible risk. The vulnerability is classified under CWE-89, which is a common and well-understood injection flaw that can be mitigated with proper input validation and parameterized queries. No patches have been linked yet, indicating that users of TimeMail versions 1.0 and 1.1 remain vulnerable until an update is released or mitigations are applied.
Potential Impact
For European organizations using soxft TimeMail versions 1.0 or 1.1, this vulnerability poses a risk of unauthorized access to sensitive email or scheduling data stored in backend databases. While the attack requires local or adjacent network access and low privileges, it could be exploited by insider threats or attackers who have gained limited access to the internal network. The potential impact includes data leakage, unauthorized data modification, and service disruption, which can affect business continuity and data privacy compliance obligations such as GDPR. Organizations relying on TimeMail for critical communications or scheduling may face operational disruptions or reputational damage if exploited. Given the medium severity and the absence of known active exploits, the immediate risk is moderate but should not be underestimated, especially in environments with less stringent network segmentation or insider threat controls.
Mitigation Recommendations
European organizations should immediately audit their use of soxft TimeMail and identify any deployments of versions 1.0 or 1.1. Until a vendor patch is available, mitigation should focus on restricting access to the affected check.php functionality by implementing strict network segmentation and firewall rules to limit access to trusted hosts only. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'c' parameter can reduce exploitation risk. Organizations should also conduct code reviews or implement input validation and parameterized queries if they maintain custom or extended versions of TimeMail. Monitoring logs for unusual database query patterns or failed injection attempts can provide early detection. Finally, organizations should engage with soxft for timely patch releases and plan for prompt updates once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-09T13:55:45.530Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec8a1
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 1:41:59 PM
Last updated: 7/31/2025, 4:10:42 PM
Views: 12
Related Threats
CVE-2025-54956: CWE-669 Incorrect Resource Transfer Between Spheres in r-lib gh
LowCVE-2025-8513: Improper Export of Android Application Components in Caixin News App
MediumCVE-2025-8512: Improper Export of Android Application Components in TVB Big Big Shop App
MediumCVE-2025-8511: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-8510: Cross Site Scripting in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.