Skip to main content

CVE-2025-0668: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in BOINC BOINC Server

Critical
VulnerabilityCVE-2025-0668cvecve-2025-0668cwe-89
Published: Wed May 07 2025 (05/07/2025, 07:39:26 UTC)
Source: CVE
Vendor/Project: BOINC
Product: BOINC Server

Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: before 1.4.5.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:58:39 UTC

Technical Analysis

CVE-2025-0668 is a critical SQL Injection vulnerability (CWE-89) affecting the BOINC Server software, specifically versions before 1.4.5. BOINC (Berkeley Open Infrastructure for Network Computing) is a platform used for volunteer computing and distributed grid projects, enabling researchers to leverage idle computing resources worldwide. The vulnerability arises from improper neutralization of special elements in SQL commands, allowing an attacker to inject malicious SQL code. This can lead to unauthorized data access, data modification, or even full compromise of the backend database. The CVSS 4.0 score of 9.3 reflects the high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and high impact on confidentiality and integrity (VC:H/VI:H). The vulnerability does not require authentication, making it exploitable remotely by unauthenticated attackers. Although the description also mentions a Stored Cross-Site Scripting (XSS) issue, the primary concern here is the SQL Injection flaw. No known exploits are currently in the wild, but the critical nature and ease of exploitation make it a significant threat. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or upgrade once fixes are released.

Potential Impact

For European organizations using BOINC Server, this vulnerability poses a severe risk to data confidentiality and integrity. Exploitation could lead to unauthorized access to sensitive research data, manipulation of project results, or disruption of distributed computing operations. Given BOINC's use in scientific and academic environments, compromised data integrity could undermine research credibility and lead to loss of trust. Additionally, attackers could leverage the vulnerability to pivot into internal networks or exfiltrate sensitive information. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks. Organizations involved in critical research, healthcare, or government projects using BOINC are particularly at risk, as data breaches or service disruptions could have cascading effects on public services and innovation.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to BOINC Server interfaces to trusted IPs and internal networks, employing web application firewalls (WAFs) with SQL Injection detection and blocking capabilities, and monitoring logs for suspicious SQL queries or anomalous behavior. Organizations should prioritize upgrading to BOINC Server version 1.4.5 or later once available. In the interim, code review and input validation enhancements should be applied to sanitize all user inputs rigorously. Implementing database user accounts with least privilege can limit the impact of successful injection attempts. Regular backups of databases and system configurations are essential to enable recovery from potential compromises. Security teams should also conduct penetration testing focused on SQL Injection vectors and ensure incident response plans are updated to address potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
NCSC.ch
Date Reserved
2025-01-23T09:00:45.417Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd991f

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 1:58:39 PM

Last updated: 8/18/2025, 10:52:50 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats