CVE-2025-0668: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in BOINC BOINC Server
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: before 1.4.5.
AI Analysis
Technical Summary
CVE-2025-0668 is a critical SQL Injection vulnerability (CWE-89) affecting the BOINC Server software, specifically versions before 1.4.5. BOINC (Berkeley Open Infrastructure for Network Computing) is a platform used for volunteer computing and distributed grid projects, enabling researchers to leverage idle computing resources worldwide. The vulnerability arises from improper neutralization of special elements in SQL commands, allowing an attacker to inject malicious SQL code. This can lead to unauthorized data access, data modification, or even full compromise of the backend database. The CVSS 4.0 score of 9.3 reflects the high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and high impact on confidentiality and integrity (VC:H/VI:H). The vulnerability does not require authentication, making it exploitable remotely by unauthenticated attackers. Although the description also mentions a Stored Cross-Site Scripting (XSS) issue, the primary concern here is the SQL Injection flaw. No known exploits are currently in the wild, but the critical nature and ease of exploitation make it a significant threat. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or upgrade once fixes are released.
Potential Impact
For European organizations using BOINC Server, this vulnerability poses a severe risk to data confidentiality and integrity. Exploitation could lead to unauthorized access to sensitive research data, manipulation of project results, or disruption of distributed computing operations. Given BOINC's use in scientific and academic environments, compromised data integrity could undermine research credibility and lead to loss of trust. Additionally, attackers could leverage the vulnerability to pivot into internal networks or exfiltrate sensitive information. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks. Organizations involved in critical research, healthcare, or government projects using BOINC are particularly at risk, as data breaches or service disruptions could have cascading effects on public services and innovation.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to BOINC Server interfaces to trusted IPs and internal networks, employing web application firewalls (WAFs) with SQL Injection detection and blocking capabilities, and monitoring logs for suspicious SQL queries or anomalous behavior. Organizations should prioritize upgrading to BOINC Server version 1.4.5 or later once available. In the interim, code review and input validation enhancements should be applied to sanitize all user inputs rigorously. Implementing database user accounts with least privilege can limit the impact of successful injection attempts. Regular backups of databases and system configurations are essential to enable recovery from potential compromises. Security teams should also conduct penetration testing focused on SQL Injection vectors and ensure incident response plans are updated to address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Sweden, Belgium
CVE-2025-0668: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in BOINC BOINC Server
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: before 1.4.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-0668 is a critical SQL Injection vulnerability (CWE-89) affecting the BOINC Server software, specifically versions before 1.4.5. BOINC (Berkeley Open Infrastructure for Network Computing) is a platform used for volunteer computing and distributed grid projects, enabling researchers to leverage idle computing resources worldwide. The vulnerability arises from improper neutralization of special elements in SQL commands, allowing an attacker to inject malicious SQL code. This can lead to unauthorized data access, data modification, or even full compromise of the backend database. The CVSS 4.0 score of 9.3 reflects the high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and high impact on confidentiality and integrity (VC:H/VI:H). The vulnerability does not require authentication, making it exploitable remotely by unauthenticated attackers. Although the description also mentions a Stored Cross-Site Scripting (XSS) issue, the primary concern here is the SQL Injection flaw. No known exploits are currently in the wild, but the critical nature and ease of exploitation make it a significant threat. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or upgrade once fixes are released.
Potential Impact
For European organizations using BOINC Server, this vulnerability poses a severe risk to data confidentiality and integrity. Exploitation could lead to unauthorized access to sensitive research data, manipulation of project results, or disruption of distributed computing operations. Given BOINC's use in scientific and academic environments, compromised data integrity could undermine research credibility and lead to loss of trust. Additionally, attackers could leverage the vulnerability to pivot into internal networks or exfiltrate sensitive information. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks. Organizations involved in critical research, healthcare, or government projects using BOINC are particularly at risk, as data breaches or service disruptions could have cascading effects on public services and innovation.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to BOINC Server interfaces to trusted IPs and internal networks, employing web application firewalls (WAFs) with SQL Injection detection and blocking capabilities, and monitoring logs for suspicious SQL queries or anomalous behavior. Organizations should prioritize upgrading to BOINC Server version 1.4.5 or later once available. In the interim, code review and input validation enhancements should be applied to sanitize all user inputs rigorously. Implementing database user accounts with least privilege can limit the impact of successful injection attempts. Regular backups of databases and system configurations are essential to enable recovery from potential compromises. Security teams should also conduct penetration testing focused on SQL Injection vectors and ensure incident response plans are updated to address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NCSC.ch
- Date Reserved
- 2025-01-23T09:00:45.417Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd991f
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 1:58:39 PM
Last updated: 8/18/2025, 10:52:50 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.