CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
A vulnerability was found in HJSoft HCM Human Resources Management System up to 20250822. Affected by this vulnerability is an unknown functionality of the file /templates/attestation/../../selfservice/lawresource/downlawbase. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10197 is a medium-severity SQL Injection vulnerability affecting the HJSoft HCM Human Resources Management System, specifically versions up to 20250822. The vulnerability resides in an unspecified functionality related to the file path /templates/attestation/../../selfservice/lawresource/downlawbase. Manipulation of the 'ID' argument in this context allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), suggesting that while the attacker can execute SQL commands, the scope of damage is somewhat constrained. The vendor was notified early but has not responded or provided a patch, and a public exploit exists, increasing the risk of exploitation. The vulnerability's CVSS score of 5.3 reflects a moderate risk, primarily due to the ease of exploitation and potential access to sensitive HR data stored within the system. The HCM system typically manages employee records, payroll, and other sensitive personal data, making this vulnerability significant for organizations relying on this software. The lack of vendor response and absence of patches necessitate immediate attention from users of the affected versions.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive employee data, including personal identification details, payroll information, and potentially other HR-related records. Exploitation could lead to unauthorized data disclosure, data manipulation, or disruption of HR services, impacting business operations and compliance with data protection regulations such as GDPR. Given the critical nature of HR data, a successful attack could result in reputational damage, legal penalties, and financial losses. The remote and unauthenticated nature of the exploit increases the threat, especially for organizations with externally accessible HCM portals. Additionally, the absence of vendor patches means organizations must rely on internal mitigations, increasing operational burden. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still represents a significant risk to data security and operational continuity.
Mitigation Recommendations
Organizations using HJSoft HCM Human Resources Management System up to version 20250822 should immediately implement the following mitigations: 1) Restrict external access to the affected application components, especially the selfservice/lawresource/downlawbase endpoint, using network segmentation and firewall rules. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3) Conduct thorough input validation and sanitization on all user-supplied inputs, particularly the 'ID' argument, to prevent injection attacks. 4) Monitor application logs for suspicious activities indicative of SQL injection attempts. 5) If possible, upgrade to a newer version of the software once the vendor releases a patch or consider alternative HR management solutions with active security support. 6) Implement strict least privilege access controls to limit the database permissions of the application user, minimizing potential damage from exploitation. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts. Since no official patch is available, these compensating controls are critical to reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
Description
A vulnerability was found in HJSoft HCM Human Resources Management System up to 20250822. Affected by this vulnerability is an unknown functionality of the file /templates/attestation/../../selfservice/lawresource/downlawbase. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10197 is a medium-severity SQL Injection vulnerability affecting the HJSoft HCM Human Resources Management System, specifically versions up to 20250822. The vulnerability resides in an unspecified functionality related to the file path /templates/attestation/../../selfservice/lawresource/downlawbase. Manipulation of the 'ID' argument in this context allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), suggesting that while the attacker can execute SQL commands, the scope of damage is somewhat constrained. The vendor was notified early but has not responded or provided a patch, and a public exploit exists, increasing the risk of exploitation. The vulnerability's CVSS score of 5.3 reflects a moderate risk, primarily due to the ease of exploitation and potential access to sensitive HR data stored within the system. The HCM system typically manages employee records, payroll, and other sensitive personal data, making this vulnerability significant for organizations relying on this software. The lack of vendor response and absence of patches necessitate immediate attention from users of the affected versions.
Potential Impact
For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive employee data, including personal identification details, payroll information, and potentially other HR-related records. Exploitation could lead to unauthorized data disclosure, data manipulation, or disruption of HR services, impacting business operations and compliance with data protection regulations such as GDPR. Given the critical nature of HR data, a successful attack could result in reputational damage, legal penalties, and financial losses. The remote and unauthenticated nature of the exploit increases the threat, especially for organizations with externally accessible HCM portals. Additionally, the absence of vendor patches means organizations must rely on internal mitigations, increasing operational burden. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still represents a significant risk to data security and operational continuity.
Mitigation Recommendations
Organizations using HJSoft HCM Human Resources Management System up to version 20250822 should immediately implement the following mitigations: 1) Restrict external access to the affected application components, especially the selfservice/lawresource/downlawbase endpoint, using network segmentation and firewall rules. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3) Conduct thorough input validation and sanitization on all user-supplied inputs, particularly the 'ID' argument, to prevent injection attacks. 4) Monitor application logs for suspicious activities indicative of SQL injection attempts. 5) If possible, upgrade to a newer version of the software once the vendor releases a patch or consider alternative HR management solutions with active security support. 6) Implement strict least privilege access controls to limit the database permissions of the application user, minimizing potential damage from exploitation. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts. Since no official patch is available, these compensating controls are critical to reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-09T16:14:04.492Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0cb539ed239a66bae6162
Added to database: 9/10/2025, 12:50:27 AM
Last enriched: 9/10/2025, 1:06:59 AM
Last updated: 9/10/2025, 4:07:20 AM
Views: 11
Related Threats
CVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.