CVE-2025-12514: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon Infra Monitoring - Open-tickets
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring - Open-tickets (Notification rules configuration parameters, Open tickets modules) allows SQL Injection to user with elevated privileges.This issue affects Infra Monitoring - Open-tickets: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.
AI Analysis
Technical Summary
CVE-2025-12514 is a SQL Injection vulnerability classified under CWE-89, affecting the Centreon Infra Monitoring product specifically in its Open-tickets module. The flaw stems from improper neutralization of special characters in SQL commands constructed from notification rules configuration parameters and open tickets modules. This improper sanitization allows an attacker with elevated privileges to inject malicious SQL code, which can be executed by the backend database. The affected versions include 23.10.0 before 23.10.4, 24.04.0 before 24.04.5, and 24.10.0 before 24.10.5. The vulnerability enables attackers to manipulate database queries, potentially leading to unauthorized data access, modification, or deletion, and disruption of monitoring services. The CVSS 3.1 score of 7.2 reflects high severity due to network attack vector (AV:N), low attack complexity (AC:L), requirement of high privileges (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability poses a significant risk to organizations relying on Centreon for infrastructure monitoring, as attackers could leverage this to compromise monitoring data or disrupt alerting mechanisms. The vulnerability was reserved on 2025-10-30 and published on 2025-12-22, but no official patches or mitigations have been linked yet, emphasizing the need for immediate attention from affected users.
Potential Impact
For European organizations, the impact of CVE-2025-12514 can be substantial. Centreon Infra Monitoring is widely used in enterprise and critical infrastructure environments for real-time monitoring and alerting. Exploitation of this SQL Injection vulnerability could lead to unauthorized access to sensitive monitoring data, manipulation or deletion of tickets and alerts, and disruption of monitoring operations. This can impair incident response capabilities and increase the risk of undetected outages or security breaches. Given the high confidentiality, integrity, and availability impact, attackers could gain insights into network topology, system health, and potentially pivot to other internal systems. The requirement for elevated privileges limits the attack surface but does not eliminate risk, as insider threats or compromised privileged accounts could exploit this flaw. European sectors such as finance, energy, telecommunications, and government agencies that rely on Centreon for infrastructure monitoring are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent remediation to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade to the latest patched versions of Centreon Infra Monitoring once available, specifically versions 23.10.4, 24.04.5, or 24.10.5 or later. 2. Until patches are released, restrict access to the Open-tickets module and notification rules configuration to only the most trusted administrators and monitor for unusual activity. 3. Implement strict role-based access control (RBAC) to limit elevated privileges and enforce the principle of least privilege. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block SQL injection patterns targeting Centreon interfaces. 5. Conduct regular security audits and code reviews of custom notification rules or scripts that interact with the Open-tickets module. 6. Monitor logs for anomalous SQL queries or failed injection attempts to detect early exploitation attempts. 7. Educate privileged users on the risks of SQL injection and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 8. Isolate Centreon monitoring infrastructure from general user networks to reduce exposure. 9. Prepare incident response plans specific to monitoring system compromise to minimize operational impact.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain
CVE-2025-12514: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon Infra Monitoring - Open-tickets
Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring - Open-tickets (Notification rules configuration parameters, Open tickets modules) allows SQL Injection to user with elevated privileges.This issue affects Infra Monitoring - Open-tickets: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.5, from 23.10.0 before 23.10.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-12514 is a SQL Injection vulnerability classified under CWE-89, affecting the Centreon Infra Monitoring product specifically in its Open-tickets module. The flaw stems from improper neutralization of special characters in SQL commands constructed from notification rules configuration parameters and open tickets modules. This improper sanitization allows an attacker with elevated privileges to inject malicious SQL code, which can be executed by the backend database. The affected versions include 23.10.0 before 23.10.4, 24.04.0 before 24.04.5, and 24.10.0 before 24.10.5. The vulnerability enables attackers to manipulate database queries, potentially leading to unauthorized data access, modification, or deletion, and disruption of monitoring services. The CVSS 3.1 score of 7.2 reflects high severity due to network attack vector (AV:N), low attack complexity (AC:L), requirement of high privileges (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability poses a significant risk to organizations relying on Centreon for infrastructure monitoring, as attackers could leverage this to compromise monitoring data or disrupt alerting mechanisms. The vulnerability was reserved on 2025-10-30 and published on 2025-12-22, but no official patches or mitigations have been linked yet, emphasizing the need for immediate attention from affected users.
Potential Impact
For European organizations, the impact of CVE-2025-12514 can be substantial. Centreon Infra Monitoring is widely used in enterprise and critical infrastructure environments for real-time monitoring and alerting. Exploitation of this SQL Injection vulnerability could lead to unauthorized access to sensitive monitoring data, manipulation or deletion of tickets and alerts, and disruption of monitoring operations. This can impair incident response capabilities and increase the risk of undetected outages or security breaches. Given the high confidentiality, integrity, and availability impact, attackers could gain insights into network topology, system health, and potentially pivot to other internal systems. The requirement for elevated privileges limits the attack surface but does not eliminate risk, as insider threats or compromised privileged accounts could exploit this flaw. European sectors such as finance, energy, telecommunications, and government agencies that rely on Centreon for infrastructure monitoring are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the high severity score demands urgent remediation to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade to the latest patched versions of Centreon Infra Monitoring once available, specifically versions 23.10.4, 24.04.5, or 24.10.5 or later. 2. Until patches are released, restrict access to the Open-tickets module and notification rules configuration to only the most trusted administrators and monitor for unusual activity. 3. Implement strict role-based access control (RBAC) to limit elevated privileges and enforce the principle of least privilege. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block SQL injection patterns targeting Centreon interfaces. 5. Conduct regular security audits and code reviews of custom notification rules or scripts that interact with the Open-tickets module. 6. Monitor logs for anomalous SQL queries or failed injection attempts to detect early exploitation attempts. 7. Educate privileged users on the risks of SQL injection and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 8. Isolate Centreon monitoring infrastructure from general user networks to reduce exposure. 9. Prepare incident response plans specific to monitoring system compromise to minimize operational impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-10-30T15:26:40.360Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694926ef9679ab05af621755
Added to database: 12/22/2025, 11:09:35 AM
Last enriched: 12/22/2025, 11:20:30 AM
Last updated: 12/22/2025, 1:33:18 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54890: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
MediumCVE-2025-8460: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Centreon Infra Monitoring
MediumCVE-2025-61739: CWE-323 Reusing a Nonce, Key pair in encryption in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
HighCVE-2025-61738: CWE-319 Cleartext Transmission of Sensitive Information in Johnson Controls IQPanel2, IQHub,IQPanel2+,IQPanel 4,PowerG
LowCVE-2025-62880: CWE-352 Cross-Site Request Forgery (CSRF) in Kunal Nagar Custom 404 Pro
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.