Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10460: CWE-20 Improper Input Validation in BEIMS Contractor Web

0
Critical
VulnerabilityCVE-2025-10460cvecve-2025-10460cwe-20
Published: Mon Nov 17 2025 (11/17/2025, 02:48:25 UTC)
Source: CVE Database V5
Vendor/Project: BEIMS
Product: Contractor Web

Description

A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.

AI-Powered Analysis

AILast updated: 11/17/2025, 03:13:23 UTC

Technical Analysis

CVE-2025-10460 is a SQL Injection vulnerability classified under CWE-20 (Improper Input Validation) affecting BEIMS Contractor Web, specifically version 5.7.139. The vulnerability exists due to the failure to properly sanitize user-supplied input on the /BEIMSWeb/contractor.asp endpoint. This flaw allows unauthenticated attackers to inject arbitrary SQL commands directly into the backend database queries. Because the product is legacy and no longer maintained or patched by the vendor, no official fixes or updates are available, increasing the risk for users still running this software. Successful exploitation can lead to unauthorized data retrieval, modification, or deletion, impacting confidentiality, integrity, and availability of the database. The vulnerability requires the endpoint to be accessible over the internet, which is common in contractor-facing web applications. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:L/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. While no exploits have been reported in the wild yet, the critical severity and ease of exploitation make this a high-risk vulnerability for affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-10460 is significant. Organizations using BEIMS Contractor Web with internet-exposed contractor.asp endpoints risk unauthorized disclosure of sensitive contractor and project data, potentially including personal data protected under GDPR. The compromise of database integrity could lead to data tampering, affecting operational decisions and contractual obligations. Availability impacts, though rated lower, could disrupt contractor management workflows. The lack of vendor support means organizations cannot rely on official patches, increasing the likelihood of prolonged exposure. This vulnerability could also be leveraged as a foothold for further network intrusion or lateral movement. Industries with extensive contractor engagement such as construction, engineering, and facilities management in Europe are particularly vulnerable. Data breaches resulting from this vulnerability could lead to regulatory fines, reputational damage, and operational disruptions.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement compensating controls immediately. These include restricting internet exposure of the /BEIMSWeb/contractor.asp endpoint via firewall rules or VPN access only for trusted users. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting this endpoint. Conduct thorough input validation and sanitization at the application layer if source code access is available. Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. Isolate the BEIMS Contractor Web system within segmented network zones to limit lateral movement. Consider migrating to supported contractor management solutions to eliminate reliance on legacy, unpatched software. Regularly back up databases and test restoration procedures to mitigate availability risks. Finally, raise user awareness about the risks of legacy software and enforce strict access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MON-CSIRT
Date Reserved
2025-09-15T05:46:32.298Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a8f51c118c0da2e582c78

Added to database: 11/17/2025, 2:58:25 AM

Last enriched: 11/17/2025, 3:13:23 AM

Last updated: 11/17/2025, 6:01:16 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats