Skip to main content

CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System

Medium
VulnerabilityCVE-2025-10197cvecve-2025-10197
Published: Wed Sep 10 2025 (09/10/2025, 00:32:06 UTC)
Source: CVE Database V5
Vendor/Project: HJSoft
Product: HCM Human Resources Management System

Description

A vulnerability was found in HJSoft HCM Human Resources Management System up to 20250822. Affected by this vulnerability is an unknown functionality of the file /templates/attestation/../../selfservice/lawresource/downlawbase. Performing manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/10/2025, 01:06:59 UTC

Technical Analysis

CVE-2025-10197 is a medium-severity SQL Injection vulnerability affecting the HJSoft HCM Human Resources Management System, specifically versions up to 20250822. The vulnerability resides in an unspecified functionality related to the file path /templates/attestation/../../selfservice/lawresource/downlawbase. Manipulation of the 'ID' argument in this context allows an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), suggesting that while the attacker can execute SQL commands, the scope of damage is somewhat constrained. The vendor was notified early but has not responded or provided a patch, and a public exploit exists, increasing the risk of exploitation. The vulnerability's CVSS score of 5.3 reflects a moderate risk, primarily due to the ease of exploitation and potential access to sensitive HR data stored within the system. The HCM system typically manages employee records, payroll, and other sensitive personal data, making this vulnerability significant for organizations relying on this software. The lack of vendor response and absence of patches necessitate immediate attention from users of the affected versions.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive employee data, including personal identification details, payroll information, and potentially other HR-related records. Exploitation could lead to unauthorized data disclosure, data manipulation, or disruption of HR services, impacting business operations and compliance with data protection regulations such as GDPR. Given the critical nature of HR data, a successful attack could result in reputational damage, legal penalties, and financial losses. The remote and unauthenticated nature of the exploit increases the threat, especially for organizations with externally accessible HCM portals. Additionally, the absence of vendor patches means organizations must rely on internal mitigations, increasing operational burden. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still represents a significant risk to data security and operational continuity.

Mitigation Recommendations

Organizations using HJSoft HCM Human Resources Management System up to version 20250822 should immediately implement the following mitigations: 1) Restrict external access to the affected application components, especially the selfservice/lawresource/downlawbase endpoint, using network segmentation and firewall rules. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'ID' parameter. 3) Conduct thorough input validation and sanitization on all user-supplied inputs, particularly the 'ID' argument, to prevent injection attacks. 4) Monitor application logs for suspicious activities indicative of SQL injection attempts. 5) If possible, upgrade to a newer version of the software once the vendor releases a patch or consider alternative HR management solutions with active security support. 6) Implement strict least privilege access controls to limit the database permissions of the application user, minimizing potential damage from exploitation. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response to any exploitation attempts. Since no official patch is available, these compensating controls are critical to reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-09T16:14:04.492Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0cb539ed239a66bae6162

Added to database: 9/10/2025, 12:50:27 AM

Last enriched: 9/10/2025, 1:06:59 AM

Last updated: 9/10/2025, 4:07:20 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats