Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10460: CWE-20 Improper Input Validation in BEIMS Contractor Web

0
Critical
VulnerabilityCVE-2025-10460cvecve-2025-10460cwe-20
Published: Mon Nov 17 2025 (11/17/2025, 02:48:25 UTC)
Source: CVE Database V5
Vendor/Project: BEIMS
Product: Contractor Web

Description

A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.

AI-Powered Analysis

AILast updated: 11/24/2025, 04:52:31 UTC

Technical Analysis

CVE-2025-10460 identifies a critical SQL Injection vulnerability in BEIMS Contractor Web, specifically version 5.7.139, a legacy contractor management web application no longer supported or patched by its vendor. The vulnerability stems from improper input validation (CWE-20) on the /BEIMSWeb/contractor.asp endpoint, which processes user-supplied parameters without adequate sanitization. This allows unauthenticated attackers to inject arbitrary SQL commands directly into the backend database queries. Successful exploitation can lead to unauthorized retrieval, modification, or deletion of sensitive data stored within the database, compromising confidentiality, integrity, and potentially availability. The vulnerability requires the endpoint to be exposed to the internet but does not require any authentication or user interaction, increasing the attack surface and ease of exploitation. No official patches or updates are currently available, and all versions should be treated as vulnerable until vendor confirmation. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality and integrity. The lack of vendor support means organizations must rely on compensating controls such as network segmentation, web application firewalls, and migration strategies. Given the product’s legacy status, many organizations may still rely on it for contractor management, making this vulnerability a significant risk for data breaches and operational impact.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive contractor and project data managed within BEIMS Contractor Web. Exploitation could lead to unauthorized disclosure of personal, financial, or operational information, potentially violating GDPR and other data protection regulations. Integrity compromise could allow attackers to alter records, disrupt contractor workflows, or inject malicious data, leading to operational disruptions and loss of trust. Availability impacts, while less likely, could occur if attackers execute destructive SQL commands. The lack of vendor patches increases the risk of prolonged exposure, especially for organizations with internet-facing contractor management portals. This could result in regulatory penalties, reputational damage, and financial losses. European critical infrastructure sectors and large enterprises relying on BEIMS Contractor Web for contractor oversight are particularly vulnerable. The ease of exploitation without authentication or user interaction further elevates the threat level, making timely mitigation essential.

Mitigation Recommendations

1. Immediately assess and identify all instances of BEIMS Contractor Web in your environment, focusing on version 5.7.139 and earlier. 2. Restrict or disable internet exposure of the /BEIMSWeb/contractor.asp endpoint by implementing network segmentation and access controls, limiting access to trusted internal networks only. 3. Deploy and configure web application firewalls (WAFs) with specific SQL Injection detection and prevention rules tailored to the BEIMS Contractor Web traffic patterns. 4. Conduct thorough input validation and sanitization at any custom integration points or proxy layers if possible, to block malicious payloads. 5. Monitor logs and network traffic for unusual SQL query patterns or suspicious access attempts targeting the vulnerable endpoint. 6. Develop and execute a migration plan to replace BEIMS Contractor Web with a supported, actively maintained contractor management solution. 7. If immediate replacement is not feasible, consider deploying virtual patching techniques via WAFs or reverse proxies to mitigate exploitation risk. 8. Educate IT and security teams about the vulnerability specifics and ensure incident response plans include scenarios involving SQL Injection attacks on legacy web applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MON-CSIRT
Date Reserved
2025-09-15T05:46:32.298Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a8f51c118c0da2e582c78

Added to database: 11/17/2025, 2:58:25 AM

Last enriched: 11/24/2025, 4:52:31 AM

Last updated: 1/7/2026, 8:48:10 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats