CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
A vulnerability was found in HJSoft HCM Human Resources Management System up to 20250822. Affected by this vulnerability is an unknown functionality of the file /templates/attestation/../../selfservice/lawresource/downlawbase. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10197 is a SQL Injection vulnerability identified in the HJSoft HCM Human Resources Management System, specifically affecting versions up to 20250822. The vulnerability exists in an unspecified functionality related to the file path /templates/attestation/../../selfservice/lawresource/downlawbase, where manipulation of the 'ID' argument allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, as attackers can potentially extract sensitive HR data, modify records, or disrupt system operations. The vendor has not responded to early disclosure attempts, and although no public exploit is confirmed in the wild, proof-of-concept code has been made available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, categorizing this as a medium severity vulnerability. The vulnerability's scope is limited to the HJSoft HCM product, which is a specialized Human Resources Management System, likely used by organizations managing employee data and HR workflows.
Potential Impact
For European organizations using HJSoft HCM, this vulnerability poses a significant risk to sensitive employee data, including personal identification, payroll, and legal compliance information. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, undermining trust and potentially violating GDPR and other data protection regulations. The ability to remotely exploit the vulnerability without user interaction or authentication increases the threat level, especially for organizations with externally accessible HR portals. Compromise of HR systems can also facilitate lateral movement within corporate networks, potentially exposing broader enterprise assets. The lack of vendor response and absence of patches exacerbate the risk, leaving European entities exposed until mitigations or updates are available.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting external access to the affected HR system via network segmentation and firewall rules, limiting exposure to trusted internal networks only. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in the vulnerable endpoint. 3) Conducting thorough input validation and sanitization at the application layer if customization is possible. 4) Monitoring logs for anomalous query patterns or repeated access attempts to the vulnerable URL path. 5) Planning for rapid deployment of vendor patches once available and maintaining close communication with HJSoft for updates. 6) Considering temporary migration or isolation of critical HR data until the vulnerability is remediated. 7) Conducting employee awareness to recognize potential phishing or social engineering attempts that might leverage this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
Description
A vulnerability was found in HJSoft HCM Human Resources Management System up to 20250822. Affected by this vulnerability is an unknown functionality of the file /templates/attestation/../../selfservice/lawresource/downlawbase. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10197 is a SQL Injection vulnerability identified in the HJSoft HCM Human Resources Management System, specifically affecting versions up to 20250822. The vulnerability exists in an unspecified functionality related to the file path /templates/attestation/../../selfservice/lawresource/downlawbase, where manipulation of the 'ID' argument allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, as attackers can potentially extract sensitive HR data, modify records, or disrupt system operations. The vendor has not responded to early disclosure attempts, and although no public exploit is confirmed in the wild, proof-of-concept code has been made available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, categorizing this as a medium severity vulnerability. The vulnerability's scope is limited to the HJSoft HCM product, which is a specialized Human Resources Management System, likely used by organizations managing employee data and HR workflows.
Potential Impact
For European organizations using HJSoft HCM, this vulnerability poses a significant risk to sensitive employee data, including personal identification, payroll, and legal compliance information. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, undermining trust and potentially violating GDPR and other data protection regulations. The ability to remotely exploit the vulnerability without user interaction or authentication increases the threat level, especially for organizations with externally accessible HR portals. Compromise of HR systems can also facilitate lateral movement within corporate networks, potentially exposing broader enterprise assets. The lack of vendor response and absence of patches exacerbate the risk, leaving European entities exposed until mitigations or updates are available.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting external access to the affected HR system via network segmentation and firewall rules, limiting exposure to trusted internal networks only. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter in the vulnerable endpoint. 3) Conducting thorough input validation and sanitization at the application layer if customization is possible. 4) Monitoring logs for anomalous query patterns or repeated access attempts to the vulnerable URL path. 5) Planning for rapid deployment of vendor patches once available and maintaining close communication with HJSoft for updates. 6) Considering temporary migration or isolation of critical HR data until the vulnerability is remediated. 7) Conducting employee awareness to recognize potential phishing or social engineering attempts that might leverage this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-09T16:14:04.492Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0cb539ed239a66bae6162
Added to database: 9/10/2025, 12:50:27 AM
Last enriched: 9/17/2025, 1:12:13 AM
Last updated: 10/29/2025, 12:59:50 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11632: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
MediumCVE-2025-11587: CWE-862 Missing Authorization in jgrietveld Call Now Button – The #1 Click to Call Button for WordPress
MediumInside the Data on Insider Threats: What 1,000 Real Cases Reveal About Hidden Risk
MediumCVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
MediumCVE-2024-52316: CWE-391 Unchecked Error Condition in Apache Software Foundation Apache Tomcat
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.