CVE-2025-13168: SQL Injection in ury-erp ury
A weakness has been identified in ury-erp ury up to 0.2.0. This affects the function overrided_past_order_list of the file ury/ury/api/pos_extend.py. This manipulation of the argument search_term causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. Upgrading to version 0.2.1 is able to mitigate this issue. Patch name: 063384e0dddfd191847cd2d6524c342cc380b058. It is suggested to upgrade the affected component. The vendor replied and reacted very professional.
AI Analysis
Technical Summary
CVE-2025-13168 is a SQL injection vulnerability identified in the ury-erp software, specifically affecting the ury product versions 0.1 and 0.2.0. The vulnerability resides in the overrided_past_order_list function located in the ury/ury/api/pos_extend.py file. The issue arises due to insufficient sanitization or validation of the search_term parameter, which is directly incorporated into SQL queries. This flaw allows remote attackers to manipulate the SQL query logic by injecting malicious SQL code through the search_term argument. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability with low complexity and no privileges required. The vendor has responded professionally by releasing a patch in version 0.2.1, identified by patch hash 063384e0dddfd191847cd2d6524c342cc380b058, which properly sanitizes the input and mitigates the vulnerability. Although no active exploits have been reported in the wild, the public availability of exploit code increases the risk of exploitation by threat actors. This vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt database operations, potentially impacting business continuity and data privacy.
Potential Impact
For European organizations using ury-erp, this vulnerability poses a tangible risk to the confidentiality, integrity, and availability of their ERP data. Successful exploitation could lead to unauthorized data disclosure, manipulation of business-critical order information, or denial of service conditions affecting ERP functionality. This could disrupt supply chain management, financial reporting, and operational workflows, leading to financial losses and reputational damage. Given the remote exploitability without authentication, attackers could target exposed ury-erp instances directly over the internet or internal networks. Organizations in sectors with stringent data protection regulations such as GDPR may face compliance risks if sensitive personal or business data is compromised. The medium severity score indicates that while the vulnerability is not critical, it still requires timely remediation to prevent exploitation, especially in environments where ury-erp is integrated with other critical systems.
Mitigation Recommendations
European organizations should immediately upgrade ury-erp to version 0.2.1 or later, as this update contains the official patch that properly sanitizes the search_term parameter to prevent SQL injection. Until the upgrade is applied, organizations should implement network-level protections such as restricting access to the ury-erp application to trusted internal networks or VPNs, and deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the search_term parameter. Regularly audit and monitor database logs for suspicious queries or anomalies indicative of injection attempts. Conduct security assessments and penetration testing focused on input validation controls within ury-erp. Additionally, ensure that database user permissions follow the principle of least privilege to limit the potential damage from any successful injection. Maintain up-to-date backups of ERP data to enable recovery in case of data corruption or deletion. Finally, keep abreast of vendor advisories and threat intelligence feeds for any emerging exploit activity related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13168: SQL Injection in ury-erp ury
Description
A weakness has been identified in ury-erp ury up to 0.2.0. This affects the function overrided_past_order_list of the file ury/ury/api/pos_extend.py. This manipulation of the argument search_term causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. Upgrading to version 0.2.1 is able to mitigate this issue. Patch name: 063384e0dddfd191847cd2d6524c342cc380b058. It is suggested to upgrade the affected component. The vendor replied and reacted very professional.
AI-Powered Analysis
Technical Analysis
CVE-2025-13168 is a SQL injection vulnerability identified in the ury-erp software, specifically affecting the ury product versions 0.1 and 0.2.0. The vulnerability resides in the overrided_past_order_list function located in the ury/ury/api/pos_extend.py file. The issue arises due to insufficient sanitization or validation of the search_term parameter, which is directly incorporated into SQL queries. This flaw allows remote attackers to manipulate the SQL query logic by injecting malicious SQL code through the search_term argument. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability with low complexity and no privileges required. The vendor has responded professionally by releasing a patch in version 0.2.1, identified by patch hash 063384e0dddfd191847cd2d6524c342cc380b058, which properly sanitizes the input and mitigates the vulnerability. Although no active exploits have been reported in the wild, the public availability of exploit code increases the risk of exploitation by threat actors. This vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt database operations, potentially impacting business continuity and data privacy.
Potential Impact
For European organizations using ury-erp, this vulnerability poses a tangible risk to the confidentiality, integrity, and availability of their ERP data. Successful exploitation could lead to unauthorized data disclosure, manipulation of business-critical order information, or denial of service conditions affecting ERP functionality. This could disrupt supply chain management, financial reporting, and operational workflows, leading to financial losses and reputational damage. Given the remote exploitability without authentication, attackers could target exposed ury-erp instances directly over the internet or internal networks. Organizations in sectors with stringent data protection regulations such as GDPR may face compliance risks if sensitive personal or business data is compromised. The medium severity score indicates that while the vulnerability is not critical, it still requires timely remediation to prevent exploitation, especially in environments where ury-erp is integrated with other critical systems.
Mitigation Recommendations
European organizations should immediately upgrade ury-erp to version 0.2.1 or later, as this update contains the official patch that properly sanitizes the search_term parameter to prevent SQL injection. Until the upgrade is applied, organizations should implement network-level protections such as restricting access to the ury-erp application to trusted internal networks or VPNs, and deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the search_term parameter. Regularly audit and monitor database logs for suspicious queries or anomalies indicative of injection attempts. Conduct security assessments and penetration testing focused on input validation controls within ury-erp. Additionally, ensure that database user permissions follow the principle of least privilege to limit the potential damage from any successful injection. Maintain up-to-date backups of ERP data to enable recovery in case of data corruption or deletion. Finally, keep abreast of vendor advisories and threat intelligence feeds for any emerging exploit activity related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T08:13:43.179Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69174732ec553ac0a0d74e04
Added to database: 11/14/2025, 3:13:54 PM
Last enriched: 11/14/2025, 3:28:48 PM
Last updated: 11/14/2025, 11:13:13 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-7328: CWE-306 Missing Authentication for Critical Function in DB Elettronica Telecomunicazioni SpA Screen SFT DAB 600/C
MediumCVE-2025-1256
UnknownCVE-2025-13188: Stack-based Buffer Overflow in D-Link DIR-816L
CriticalCVE-2025-13187: Unprotected Storage of Credentials in Intelbras ICIP
MediumCVE-2025-13186: Cross Site Scripting in Bdtask Isshue Multi Store eCommerce Shopping Cart Solution
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.