CVE-2025-2118: SQL Injection in Quantico Tecnologia PRMV
A vulnerability was found in Quantico Tecnologia PRMV 6.48. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Login Endpoint. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-2118 is a critical SQL Injection vulnerability identified in version 6.48 of the Quantico Tecnologia PRMV product, specifically affecting the /admin/login.php endpoint within the Login component. The vulnerability arises from improper sanitization or validation of the 'username' parameter, which allows an attacker to inject malicious SQL code. This injection can be executed remotely without requiring any authentication or user interaction, making exploitation straightforward. The vulnerability enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. Although the CVSS 4.0 score is 6.9 (medium severity), the classification as critical by the vendor suggests that the impact could be significant depending on the deployment context. The vulnerability does not require privileges or user interaction, and the attack vector is network-based, increasing the risk of widespread exploitation. No official patches or mitigations have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of imminent attacks. The lack of authentication requirement and the exposure of the login endpoint make this vulnerability particularly dangerous for systems accessible over the internet.
Potential Impact
For European organizations using Quantico Tecnologia PRMV 6.48, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of their systems. Exploitation could lead to unauthorized access to sensitive administrative credentials or other critical data stored in the backend database. This could result in data breaches, unauthorized system control, or disruption of services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PRMV for administrative or operational functions could face significant operational and reputational damage. The remote and unauthenticated nature of the attack vector increases the threat surface, especially for organizations with internet-facing PRMV instances. Additionally, the potential for data manipulation or deletion could disrupt business continuity and compliance with European data protection regulations such as GDPR, leading to legal and financial consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls to reduce exposure. These include: 1) Restricting access to the /admin/login.php endpoint via network-level controls such as IP whitelisting, VPNs, or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'username' parameter. 2) Conducting thorough input validation and sanitization on all user-supplied data, particularly the 'username' field, using parameterized queries or prepared statements if possible within the application code. 3) Monitoring logs for unusual or suspicious login attempts that may indicate exploitation attempts. 4) Isolating the PRMV system from direct internet exposure where feasible, placing it behind secure gateways or reverse proxies. 5) Preparing for rapid patch deployment by maintaining close communication with Quantico Tecnologia for updates or security advisories. 6) Conducting penetration testing and vulnerability scanning focused on SQL injection to identify and remediate similar weaknesses. These targeted measures go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-2118: SQL Injection in Quantico Tecnologia PRMV
Description
A vulnerability was found in Quantico Tecnologia PRMV 6.48. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Login Endpoint. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-2118 is a critical SQL Injection vulnerability identified in version 6.48 of the Quantico Tecnologia PRMV product, specifically affecting the /admin/login.php endpoint within the Login component. The vulnerability arises from improper sanitization or validation of the 'username' parameter, which allows an attacker to inject malicious SQL code. This injection can be executed remotely without requiring any authentication or user interaction, making exploitation straightforward. The vulnerability enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. Although the CVSS 4.0 score is 6.9 (medium severity), the classification as critical by the vendor suggests that the impact could be significant depending on the deployment context. The vulnerability does not require privileges or user interaction, and the attack vector is network-based, increasing the risk of widespread exploitation. No official patches or mitigations have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of imminent attacks. The lack of authentication requirement and the exposure of the login endpoint make this vulnerability particularly dangerous for systems accessible over the internet.
Potential Impact
For European organizations using Quantico Tecnologia PRMV 6.48, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of their systems. Exploitation could lead to unauthorized access to sensitive administrative credentials or other critical data stored in the backend database. This could result in data breaches, unauthorized system control, or disruption of services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PRMV for administrative or operational functions could face significant operational and reputational damage. The remote and unauthenticated nature of the attack vector increases the threat surface, especially for organizations with internet-facing PRMV instances. Additionally, the potential for data manipulation or deletion could disrupt business continuity and compliance with European data protection regulations such as GDPR, leading to legal and financial consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls to reduce exposure. These include: 1) Restricting access to the /admin/login.php endpoint via network-level controls such as IP whitelisting, VPNs, or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'username' parameter. 2) Conducting thorough input validation and sanitization on all user-supplied data, particularly the 'username' field, using parameterized queries or prepared statements if possible within the application code. 3) Monitoring logs for unusual or suspicious login attempts that may indicate exploitation attempts. 4) Isolating the PRMV system from direct internet exposure where feasible, placing it behind secure gateways or reverse proxies. 5) Preparing for rapid patch deployment by maintaining close communication with Quantico Tecnologia for updates or security advisories. 6) Conducting penetration testing and vulnerability scanning focused on SQL injection to identify and remediate similar weaknesses. These targeted measures go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-03-08T07:36:58.854Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6cef
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:04:44 AM
Last updated: 8/10/2025, 8:27:06 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.