Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13168: SQL Injection in ury-erp ury

0
Medium
VulnerabilityCVE-2025-13168cvecve-2025-13168
Published: Fri Nov 14 2025 (11/14/2025, 15:02:06 UTC)
Source: CVE Database V5
Vendor/Project: ury-erp
Product: ury

Description

A weakness has been identified in ury-erp ury up to 0.2.0. This affects the function overrided_past_order_list of the file ury/ury/api/pos_extend.py. This manipulation of the argument search_term causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. Upgrading to version 0.2.1 is able to mitigate this issue. Patch name: 063384e0dddfd191847cd2d6524c342cc380b058. It is suggested to upgrade the affected component. The vendor replied and reacted very professional.

AI-Powered Analysis

AILast updated: 11/14/2025, 15:28:48 UTC

Technical Analysis

CVE-2025-13168 is a SQL injection vulnerability identified in the ury-erp software, specifically affecting the ury product versions 0.1 and 0.2.0. The vulnerability resides in the overrided_past_order_list function located in the ury/ury/api/pos_extend.py file. The issue arises due to insufficient sanitization or validation of the search_term parameter, which is directly incorporated into SQL queries. This flaw allows remote attackers to manipulate the SQL query logic by injecting malicious SQL code through the search_term argument. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability with low complexity and no privileges required. The vendor has responded professionally by releasing a patch in version 0.2.1, identified by patch hash 063384e0dddfd191847cd2d6524c342cc380b058, which properly sanitizes the input and mitigates the vulnerability. Although no active exploits have been reported in the wild, the public availability of exploit code increases the risk of exploitation by threat actors. This vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt database operations, potentially impacting business continuity and data privacy.

Potential Impact

For European organizations using ury-erp, this vulnerability poses a tangible risk to the confidentiality, integrity, and availability of their ERP data. Successful exploitation could lead to unauthorized data disclosure, manipulation of business-critical order information, or denial of service conditions affecting ERP functionality. This could disrupt supply chain management, financial reporting, and operational workflows, leading to financial losses and reputational damage. Given the remote exploitability without authentication, attackers could target exposed ury-erp instances directly over the internet or internal networks. Organizations in sectors with stringent data protection regulations such as GDPR may face compliance risks if sensitive personal or business data is compromised. The medium severity score indicates that while the vulnerability is not critical, it still requires timely remediation to prevent exploitation, especially in environments where ury-erp is integrated with other critical systems.

Mitigation Recommendations

European organizations should immediately upgrade ury-erp to version 0.2.1 or later, as this update contains the official patch that properly sanitizes the search_term parameter to prevent SQL injection. Until the upgrade is applied, organizations should implement network-level protections such as restricting access to the ury-erp application to trusted internal networks or VPNs, and deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the search_term parameter. Regularly audit and monitor database logs for suspicious queries or anomalies indicative of injection attempts. Conduct security assessments and penetration testing focused on input validation controls within ury-erp. Additionally, ensure that database user permissions follow the principle of least privilege to limit the potential damage from any successful injection. Maintain up-to-date backups of ERP data to enable recovery in case of data corruption or deletion. Finally, keep abreast of vendor advisories and threat intelligence feeds for any emerging exploit activity related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T08:13:43.179Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69174732ec553ac0a0d74e04

Added to database: 11/14/2025, 3:13:54 PM

Last enriched: 11/14/2025, 3:28:48 PM

Last updated: 11/14/2025, 11:13:13 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats