Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14568: SQL Injection in haxxorsid Stock-Management-System

0
Medium
VulnerabilityCVE-2025-14568cvecve-2025-14568
Published: Fri Dec 12 2025 (12/12/2025, 18:02:06 UTC)
Source: CVE Database V5
Vendor/Project: haxxorsid
Product: Stock-Management-System

Description

A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 12/19/2025, 18:58:43 UTC

Technical Analysis

CVE-2025-14568 is a SQL injection vulnerability identified in the haxxorsid Stock-Management-System, specifically within the model/User.php file. The vulnerability is triggered by manipulation of the employee_id, id, or admin parameters, which are not properly sanitized before being incorporated into SQL queries. This allows remote attackers to inject malicious SQL commands without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The product employs continuous delivery with rolling releases, complicating version tracking, but the vulnerability affects versions up to commit fbbbf213e9c93b87183a3891f77e3cc7095f22b0. The vendor has not responded to vulnerability reports, and no patches or updates are available, as the affected versions are no longer supported. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low complexity, no privileges or user interaction needed, but limited scope and impact. Although no known exploits are currently active in the wild, the public disclosure increases the risk of exploitation by threat actors. The vulnerability could compromise the confidentiality, integrity, and availability of the stock management data, potentially disrupting business operations and exposing sensitive information. The lack of vendor support and patch availability necessitates alternative mitigation strategies.

Potential Impact

For European organizations using the haxxorsid Stock-Management-System, this vulnerability poses a significant risk to the confidentiality and integrity of their inventory and employee data. Exploitation could allow attackers to extract sensitive information, modify stock records, or disrupt system availability, leading to operational downtime and financial losses. Given the system's role in supply chain and stock management, such disruptions could cascade, affecting logistics and customer fulfillment. The absence of vendor patches and the unsupported status of the affected versions exacerbate the risk, as organizations cannot rely on official fixes. This is particularly critical for industries with strict regulatory requirements around data protection, such as finance, healthcare, and manufacturing. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, making it easier for external threat actors to target vulnerable installations. The impact is heightened in countries with higher adoption of this system or where supply chain resilience is a strategic priority.

Mitigation Recommendations

Since no official patches are available due to the product being unsupported, European organizations should prioritize migrating to a supported stock management solution to eliminate exposure. In the interim, implement strict input validation and sanitization on all parameters related to employee_id, id, and admin to prevent SQL injection. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting these parameters. Restrict network access to the stock management system to trusted internal IPs and use VPNs or zero-trust network architectures to reduce exposure to external attackers. Conduct regular security audits and penetration testing focused on injection flaws. Monitor logs for suspicious database queries or unusual system behavior indicative of exploitation attempts. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving SQL injection attacks. Finally, consider database-level protections such as least privilege access and query parameterization where possible, even if code changes are limited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T11:14:51.936Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c5c0653767fe238a83428

Added to database: 12/12/2025, 6:16:38 PM

Last enriched: 12/19/2025, 6:58:43 PM

Last updated: 2/7/2026, 5:27:37 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats