CVE-2025-14568: SQL Injection in haxxorsid Stock-Management-System
A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-14568 is a SQL injection vulnerability identified in the haxxorsid Stock-Management-System, specifically within the model/User.php file. The vulnerability is triggered by manipulation of the employee_id, id, or admin parameters, which are not properly sanitized before being incorporated into SQL queries. This allows remote attackers to inject malicious SQL commands without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The product employs continuous delivery with rolling releases, complicating version tracking, but the vulnerability affects versions up to commit fbbbf213e9c93b87183a3891f77e3cc7095f22b0. The vendor has not responded to vulnerability reports, and no patches or updates are available, as the affected versions are no longer supported. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges or user interaction needed, but limited scope and impact. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation by threat actors. The vulnerability could compromise the confidentiality, integrity, and availability of the stock management data, potentially disrupting business operations and exposing sensitive information. The lack of vendor support and patch availability necessitates alternative mitigation strategies.
Potential Impact
For European organizations using the haxxorsid Stock-Management-System, this vulnerability poses a significant risk to the confidentiality and integrity of their inventory and employee data. Exploitation could allow attackers to extract sensitive information, modify stock records, or disrupt system availability, leading to operational downtime and financial losses. Given the system's role in supply chain and stock management, such disruptions could cascade, affecting logistics and customer fulfillment. The absence of vendor patches and the unsupported status of the affected versions exacerbate the risk, as organizations cannot rely on official fixes. This is particularly critical for industries with strict regulatory requirements around data protection, such as finance, healthcare, and manufacturing. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for external threat actors to target vulnerable installations. The impact is heightened in countries with higher adoption of this system or where supply chain resilience is a strategic priority.
Mitigation Recommendations
Since no official patches are available due to the product being unsupported, European organizations should prioritize migrating to a supported stock management solution to eliminate exposure. In the interim, implement strict input validation and sanitization on all parameters related to employee_id, id, and admin to prevent SQL injection. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting these parameters. Restrict network access to the stock management system to trusted internal IPs and use VPNs or zero-trust network architectures to reduce exposure to external attackers. Conduct regular security audits and penetration testing focused on injection flaws. Monitor logs for suspicious database queries or unusual system behavior indicative of exploitation attempts. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving SQL injection attacks. Finally, consider database-level protections such as least privilege access and query parameterization where possible, even if code changes are limited.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14568: SQL Injection in haxxorsid Stock-Management-System
Description
A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-14568 is a SQL injection vulnerability identified in the haxxorsid Stock-Management-System, specifically within the model/User.php file. The vulnerability is triggered by manipulation of the employee_id, id, or admin parameters, which are not properly sanitized before being incorporated into SQL queries. This allows remote attackers to inject malicious SQL commands without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The product employs continuous delivery with rolling releases, complicating version tracking, but the vulnerability affects versions up to commit fbbbf213e9c93b87183a3891f77e3cc7095f22b0. The vendor has not responded to vulnerability reports, and no patches or updates are available, as the affected versions are no longer supported. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges or user interaction needed, but limited scope and impact. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation by threat actors. The vulnerability could compromise the confidentiality, integrity, and availability of the stock management data, potentially disrupting business operations and exposing sensitive information. The lack of vendor support and patch availability necessitates alternative mitigation strategies.
Potential Impact
For European organizations using the haxxorsid Stock-Management-System, this vulnerability poses a significant risk to the confidentiality and integrity of their inventory and employee data. Exploitation could allow attackers to extract sensitive information, modify stock records, or disrupt system availability, leading to operational downtime and financial losses. Given the system's role in supply chain and stock management, such disruptions could cascade, affecting logistics and customer fulfillment. The absence of vendor patches and the unsupported status of the affected versions exacerbate the risk, as organizations cannot rely on official fixes. This is particularly critical for industries with strict regulatory requirements around data protection, such as finance, healthcare, and manufacturing. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for external threat actors to target vulnerable installations. The impact is heightened in countries with higher adoption of this system or where supply chain resilience is a strategic priority.
Mitigation Recommendations
Since no official patches are available due to the product being unsupported, European organizations should prioritize migrating to a supported stock management solution to eliminate exposure. In the interim, implement strict input validation and sanitization on all parameters related to employee_id, id, and admin to prevent SQL injection. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting these parameters. Restrict network access to the stock management system to trusted internal IPs and use VPNs or zero-trust network architectures to reduce exposure to external attackers. Conduct regular security audits and penetration testing focused on injection flaws. Monitor logs for suspicious database queries or unusual system behavior indicative of exploitation attempts. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving SQL injection attacks. Finally, consider database-level protections such as least privilege access and query parameterization where possible, even if code changes are limited.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-12T11:14:51.936Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693c5c0653767fe238a83428
Added to database: 12/12/2025, 6:16:38 PM
Last enriched: 12/19/2025, 6:58:43 PM
Last updated: 2/5/2026, 4:00:45 AM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.