Skip to main content

CVE-2025-10121: SQL Injection in uverif

Medium
VulnerabilityCVE-2025-10121cvecve-2025-10121
Published: Tue Sep 09 2025 (09/09/2025, 02:02:06 UTC)
Source: CVE Database V5
Product: uverif

Description

A flaw has been found in uverif up to 3.2. This affects the function addbatch of the file /admin/kami_list. This manipulation of the argument note causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/09/2025, 02:34:32 UTC

Technical Analysis

CVE-2025-10121 is a medium-severity SQL Injection vulnerability identified in the uverif software versions 3.0 through 3.2. The vulnerability resides in the addbatch function within the /admin/kami_list file. Specifically, the flaw is triggered by improper sanitization or validation of the 'note' argument, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker with low privileges (PR:L) to execute arbitrary SQL commands on the backend database without requiring user interaction. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 vector indicates no scope change and low impact on confidentiality, integrity, and availability, but the exploitability is enhanced by the lack of required authentication and user interaction. Although no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability could allow attackers to read, modify, or delete sensitive data stored in the database, potentially leading to data leakage, unauthorized data manipulation, or disruption of service depending on the database's role within the application. Given the affected function is within an administrative path, successful exploitation could compromise administrative data or functions, amplifying the impact. The lack of available patches or official remediation guidance at the time of publication necessitates immediate attention from organizations using uverif versions 3.0 to 3.2 to mitigate potential risks.

Potential Impact

For European organizations using uverif versions 3.0 to 3.2, this vulnerability poses a tangible risk to the confidentiality and integrity of their data. Since uverif is presumably used in administrative or verification contexts, exploitation could lead to unauthorized access to sensitive administrative data or manipulation of critical records. This could result in data breaches, compliance violations (notably with GDPR), and operational disruptions. The remote and unauthenticated nature of the exploit increases the attack surface, especially for organizations exposing the affected endpoint to the internet or internal networks with insufficient segmentation. The medium severity suggests that while the impact is not catastrophic, it is significant enough to warrant prompt remediation to prevent potential data loss or unauthorized data alteration. Additionally, the publication of an exploit increases the likelihood of opportunistic attacks targeting European entities, especially those in sectors with high regulatory scrutiny or valuable data assets.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /admin/kami_list endpoint through network-level controls such as IP whitelisting, VPN access, or firewall rules to limit exposure to trusted users only. 2. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'note' parameter in the addbatch function. 3. Conduct a thorough code review and input validation enhancement for the addbatch function to sanitize and parameterize SQL queries, eliminating direct concatenation of user input. 4. If possible, upgrade to a patched version of uverif once available; in the absence of an official patch, consider applying custom patches or workarounds that enforce prepared statements or ORM usage. 5. Monitor logs for suspicious activity related to the /admin/kami_list endpoint, focusing on anomalous input patterns or repeated access attempts. 6. Educate administrators and developers about the risks of SQL injection and enforce secure coding practices to prevent similar vulnerabilities. 7. Perform regular vulnerability scanning and penetration testing to detect any exploitation attempts or residual vulnerabilities in the application environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-08T15:09:41.128Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bf8df9d5a2966cfc858124

Added to database: 9/9/2025, 2:16:25 AM

Last enriched: 9/9/2025, 2:34:32 AM

Last updated: 9/9/2025, 9:34:18 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats