Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15029: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon Infra Monitoring

0
Critical
VulnerabilityCVE-2025-15029cvecve-2025-15029cwe-89
Published: Mon Jan 05 2026 (01/05/2026, 14:34:02 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: Infra Monitoring

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon Infra Monitoring (Awie export modules) allows SQL Injection to unauthenticated user. This issue affects Infra Monitoring: from 25.10.0 before 25.10.2, from 24.10.0 before 24.10.3, from 24.04.0 before 24.04.3.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:11:36 UTC

Technical Analysis

CVE-2025-15029 is a critical SQL Injection vulnerability identified in the Centreon Infra Monitoring product, specifically within its Awie export modules. The flaw arises due to improper neutralization of special elements in SQL commands, classified under CWE-89. This vulnerability affects multiple versions of Centreon Infra Monitoring: from 24.04.0 before 24.04.3, 24.10.0 before 24.10.3, and 25.10.0 before 25.10.2. An unauthenticated attacker can exploit this vulnerability remotely without any user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The attacker can inject arbitrary SQL commands, potentially allowing them to read, modify, or delete sensitive data, escalate privileges, or execute administrative operations on the backend database. The impact spans confidentiality, integrity, and availability, making it a critical threat. No known exploits are publicly reported yet, but the high severity and ease of exploitation make it a prime target for attackers. Centreon Infra Monitoring is widely used for IT infrastructure monitoring, making this vulnerability particularly dangerous as it could disrupt monitoring capabilities and expose sensitive operational data. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, the impact of CVE-2025-15029 is significant. Centreon Infra Monitoring is commonly deployed in enterprise and critical infrastructure environments to oversee IT systems and networks. Exploitation could lead to unauthorized access to monitoring data, manipulation of monitoring results, or complete system compromise, undermining operational visibility and response capabilities. This can result in prolonged outages, data breaches involving sensitive infrastructure information, and potential cascading failures in dependent systems. Given the critical nature of infrastructure monitoring in sectors such as energy, finance, telecommunications, and government, the vulnerability poses a high risk to operational continuity and data security. Additionally, attackers could leverage this access to pivot into other parts of the network, escalating the threat. The unauthenticated nature of the exploit increases the attack surface, making perimeter defenses insufficient without proper internal controls and monitoring.

Mitigation Recommendations

1. Immediately upgrade Centreon Infra Monitoring to the latest patched versions once available (versions after 25.10.2, 24.10.3, or 24.04.3). 2. Until patches are applied, restrict network access to the Centreon web interface and Awie export modules using firewalls or network segmentation, limiting exposure to trusted IPs only. 3. Deploy Web Application Firewalls (WAFs) with robust SQL Injection detection and prevention rules tailored to Centreon’s traffic patterns. 4. Implement strict input validation and sanitization at the application layer if custom integrations exist. 5. Monitor logs and network traffic for anomalous SQL queries or unusual access patterns indicative of exploitation attempts. 6. Conduct regular security assessments and penetration tests focusing on Centreon Infra Monitoring deployments. 7. Educate IT and security teams on this vulnerability to ensure rapid detection and response. 8. Consider temporary disabling or isolating the Awie export modules if feasible until patches are deployed. 9. Maintain up-to-date backups of monitoring configurations and data to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Centreon
Date Reserved
2025-12-22T14:27:26.825Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bcf2a3dc84013b27be7b0

Added to database: 1/5/2026, 2:48:10 PM

Last enriched: 1/12/2026, 9:11:36 PM

Last updated: 2/2/2026, 8:46:06 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats