CVE-2025-13168: SQL Injection in ury-erp ury
A weakness has been identified in ury-erp ury up to 0.2.0. This affects the function overrided_past_order_list of the file ury/ury/api/pos_extend.py. This manipulation of the argument search_term causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. Upgrading to version 0.2.1 is able to mitigate this issue. Patch name: 063384e0dddfd191847cd2d6524c342cc380b058. It is suggested to upgrade the affected component. The vendor replied and reacted very professional.
AI Analysis
Technical Summary
CVE-2025-13168 is a SQL injection vulnerability identified in the ury-erp ury product, specifically affecting versions 0.1 and 0.2.0. The vulnerability resides in the overrided_past_order_list function of the ury/ury/api/pos_extend.py file, where the search_term argument is improperly sanitized, allowing an attacker to inject malicious SQL queries. This flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to a wide range of attackers. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The impact includes potential unauthorized access to sensitive data, modification or deletion of database records, and disruption of service availability. The vendor responded promptly and professionally, releasing version 0.2.1 with a patch identified by commit 063384e0dddfd191847cd2d6524c342cc380b058 to remediate the issue. Although no active exploitation has been reported, the public availability of exploit code increases the urgency for affected users to upgrade. The vulnerability does not require privileges or user interaction, and the attack vector is network-based, increasing the risk profile. The scope is limited to the ury-erp ury product installations running vulnerable versions.
Potential Impact
For European organizations, the SQL injection vulnerability in ury-erp ury could lead to unauthorized disclosure of sensitive business data, manipulation or deletion of critical ERP records, and potential downtime of ERP services. This could disrupt business operations, supply chain management, and financial processes, especially for companies relying heavily on ury-erp for order management and point-of-sale functions. Data breaches resulting from exploitation may lead to regulatory penalties under GDPR due to exposure of personal or corporate data. The medium severity rating reflects partial compromise potential, but the ease of remote exploitation without authentication raises concerns for organizations with exposed ERP interfaces. The availability of public exploit code further elevates the risk of targeted attacks or opportunistic scanning by threat actors. Organizations in sectors such as manufacturing, retail, and logistics that use ury-erp could face operational and reputational damage if exploited.
Mitigation Recommendations
European organizations using ury-erp ury should immediately upgrade to version 0.2.1 or later, which contains the official patch for CVE-2025-13168. In addition to patching, organizations should implement network-level protections such as restricting access to ERP interfaces via firewalls or VPNs to limit exposure to untrusted networks. Employing web application firewalls (WAFs) with SQL injection detection rules can provide an additional layer of defense against exploitation attempts. Conduct thorough input validation and sanitization reviews for any custom extensions or integrations with ury-erp to prevent similar injection flaws. Regularly audit ERP logs for suspicious query patterns indicative of injection attempts. Finally, ensure backups of ERP databases are maintained and tested to enable recovery in case of data corruption or deletion resulting from an attack.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-13168: SQL Injection in ury-erp ury
Description
A weakness has been identified in ury-erp ury up to 0.2.0. This affects the function overrided_past_order_list of the file ury/ury/api/pos_extend.py. This manipulation of the argument search_term causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. Upgrading to version 0.2.1 is able to mitigate this issue. Patch name: 063384e0dddfd191847cd2d6524c342cc380b058. It is suggested to upgrade the affected component. The vendor replied and reacted very professional.
AI-Powered Analysis
Technical Analysis
CVE-2025-13168 is a SQL injection vulnerability identified in the ury-erp ury product, specifically affecting versions 0.1 and 0.2.0. The vulnerability resides in the overrided_past_order_list function of the ury/ury/api/pos_extend.py file, where the search_term argument is improperly sanitized, allowing an attacker to inject malicious SQL queries. This flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to a wide range of attackers. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The impact includes potential unauthorized access to sensitive data, modification or deletion of database records, and disruption of service availability. The vendor responded promptly and professionally, releasing version 0.2.1 with a patch identified by commit 063384e0dddfd191847cd2d6524c342cc380b058 to remediate the issue. Although no active exploitation has been reported, the public availability of exploit code increases the urgency for affected users to upgrade. The vulnerability does not require privileges or user interaction, and the attack vector is network-based, increasing the risk profile. The scope is limited to the ury-erp ury product installations running vulnerable versions.
Potential Impact
For European organizations, the SQL injection vulnerability in ury-erp ury could lead to unauthorized disclosure of sensitive business data, manipulation or deletion of critical ERP records, and potential downtime of ERP services. This could disrupt business operations, supply chain management, and financial processes, especially for companies relying heavily on ury-erp for order management and point-of-sale functions. Data breaches resulting from exploitation may lead to regulatory penalties under GDPR due to exposure of personal or corporate data. The medium severity rating reflects partial compromise potential, but the ease of remote exploitation without authentication raises concerns for organizations with exposed ERP interfaces. The availability of public exploit code further elevates the risk of targeted attacks or opportunistic scanning by threat actors. Organizations in sectors such as manufacturing, retail, and logistics that use ury-erp could face operational and reputational damage if exploited.
Mitigation Recommendations
European organizations using ury-erp ury should immediately upgrade to version 0.2.1 or later, which contains the official patch for CVE-2025-13168. In addition to patching, organizations should implement network-level protections such as restricting access to ERP interfaces via firewalls or VPNs to limit exposure to untrusted networks. Employing web application firewalls (WAFs) with SQL injection detection rules can provide an additional layer of defense against exploitation attempts. Conduct thorough input validation and sanitization reviews for any custom extensions or integrations with ury-erp to prevent similar injection flaws. Regularly audit ERP logs for suspicious query patterns indicative of injection attempts. Finally, ensure backups of ERP databases are maintained and tested to enable recovery in case of data corruption or deletion resulting from an attack.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T08:13:43.179Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69174732ec553ac0a0d74e04
Added to database: 11/14/2025, 3:13:54 PM
Last enriched: 11/21/2025, 4:08:59 PM
Last updated: 12/30/2025, 7:51:34 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15355: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in NetVision Information ISOinsight
MediumCVE-2025-15232: Stack-based Buffer Overflow in Tenda M3
HighCVE-2025-15231: Stack-based Buffer Overflow in Tenda M3
HighCVE-2025-15230: Heap-based Buffer Overflow in Tenda M3
HighCVE-2025-15229: Denial of Service in Tenda CH22
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.