Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25522: n/a

0
Critical
VulnerabilityCVE-2024-25522cvecve-2024-25522
Published: Wed May 08 2024 (05/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-25522 is a critical SQL injection vulnerability found in RuvarOA versions 6. 01 and 12. 01. The flaw exists in the office_missive_id parameter at the /WorkFlow/wf_work_form_save. aspx endpoint. It allows unauthenticated remote attackers to execute arbitrary SQL commands due to improper input sanitization. The vulnerability has a CVSS score of 9. 4, indicating high impact on confidentiality, integrity, and some impact on availability. No known exploits are currently reported in the wild. Organizations using affected RuvarOA versions are at risk of data breaches, data manipulation, or partial service disruption.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:40:33 UTC

Technical Analysis

CVE-2024-25522 is a severe SQL injection vulnerability identified in RuvarOA, a workflow and office automation platform, specifically affecting versions 6.01 and 12.01. The vulnerability is triggered via the office_missive_id parameter in the /WorkFlow/wf_work_form_save.aspx page, where user-supplied input is not properly sanitized before being used in SQL queries. This allows an unauthenticated attacker to inject malicious SQL code remotely over the network without any user interaction or privileges. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The CVSS v3.1 base score is 9.4 (critical), reflecting the ease of exploitation (network accessible, no authentication required, no user interaction), and the potential for high confidentiality and integrity impact, with some availability impact. Exploitation could lead to unauthorized data disclosure, data modification, or partial denial of service. Although no public exploits have been reported yet, the critical nature and simplicity of exploitation make it a high priority for remediation. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or monitor for suspicious activity.

Potential Impact

The vulnerability poses a significant risk to organizations using RuvarOA versions 6.01 and 12.01. Successful exploitation can lead to unauthorized access to sensitive data, including confidential documents and internal communications managed by the office automation system. Attackers can modify or delete data, undermining data integrity and potentially disrupting business workflows. Partial denial of service may occur if injected queries cause application or database crashes. The breach of confidentiality and integrity can result in regulatory penalties, loss of customer trust, and operational downtime. Given RuvarOA's use in enterprise environments, the impact extends to critical business functions and potentially sensitive government or corporate information. The absence of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if unmitigated.

Mitigation Recommendations

Organizations should immediately assess their use of RuvarOA versions 6.01 and 12.01 and prioritize upgrading to patched versions once available. In the absence of official patches, implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the office_missive_id parameter. Employ input validation and parameterized queries if source code access is possible to sanitize inputs properly. Restrict network access to the affected endpoint by limiting exposure to trusted IP addresses or VPNs. Monitor logs for unusual database queries or errors indicative of injection attempts. Conduct regular security audits and penetration testing focused on SQL injection vectors. Educate development and operations teams about secure coding practices to prevent similar vulnerabilities. Establish an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6ab7ef31ef0b571ff3

Added to database: 2/25/2026, 9:45:15 PM

Last enriched: 2/26/2026, 10:40:33 AM

Last updated: 2/26/2026, 11:07:16 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats