CVE-2025-2118: SQL Injection in Quantico Tecnologia PRMV
A vulnerability was found in Quantico Tecnologia PRMV 6.48. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Login Endpoint. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-2118 is a critical SQL Injection vulnerability identified in version 6.48 of the Quantico Tecnologia PRMV product, specifically affecting the /admin/login.php endpoint within the Login component. The vulnerability arises from improper sanitization or validation of the 'username' parameter, which allows an attacker to inject malicious SQL code. This injection can be executed remotely without requiring any authentication or user interaction, making exploitation straightforward. The vulnerability enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. Although the CVSS 4.0 score is 6.9 (medium severity), the classification as critical by the vendor suggests that the impact could be significant depending on the deployment context. The vulnerability does not require privileges or user interaction, and the attack vector is network-based, increasing the risk of widespread exploitation. No official patches or mitigations have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of imminent attacks. The lack of authentication requirement and the exposure of the login endpoint make this vulnerability particularly dangerous for systems accessible over the internet.
Potential Impact
For European organizations using Quantico Tecnologia PRMV 6.48, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of their systems. Exploitation could lead to unauthorized access to sensitive administrative credentials or other critical data stored in the backend database. This could result in data breaches, unauthorized system control, or disruption of services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PRMV for administrative or operational functions could face significant operational and reputational damage. The remote and unauthenticated nature of the attack vector increases the threat surface, especially for organizations with internet-facing PRMV instances. Additionally, the potential for data manipulation or deletion could disrupt business continuity and compliance with European data protection regulations such as GDPR, leading to legal and financial consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls to reduce exposure. These include: 1) Restricting access to the /admin/login.php endpoint via network-level controls such as IP whitelisting, VPNs, or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'username' parameter. 2) Conducting thorough input validation and sanitization on all user-supplied data, particularly the 'username' field, using parameterized queries or prepared statements if possible within the application code. 3) Monitoring logs for unusual or suspicious login attempts that may indicate exploitation attempts. 4) Isolating the PRMV system from direct internet exposure where feasible, placing it behind secure gateways or reverse proxies. 5) Preparing for rapid patch deployment by maintaining close communication with Quantico Tecnologia for updates or security advisories. 6) Conducting penetration testing and vulnerability scanning focused on SQL injection to identify and remediate similar weaknesses. These targeted measures go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-2118: SQL Injection in Quantico Tecnologia PRMV
Description
A vulnerability was found in Quantico Tecnologia PRMV 6.48. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Login Endpoint. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-2118 is a critical SQL Injection vulnerability identified in version 6.48 of the Quantico Tecnologia PRMV product, specifically affecting the /admin/login.php endpoint within the Login component. The vulnerability arises from improper sanitization or validation of the 'username' parameter, which allows an attacker to inject malicious SQL code. This injection can be executed remotely without requiring any authentication or user interaction, making exploitation straightforward. The vulnerability enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the underlying database. Although the CVSS 4.0 score is 6.9 (medium severity), the classification as critical by the vendor suggests that the impact could be significant depending on the deployment context. The vulnerability does not require privileges or user interaction, and the attack vector is network-based, increasing the risk of widespread exploitation. No official patches or mitigations have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of imminent attacks. The lack of authentication requirement and the exposure of the login endpoint make this vulnerability particularly dangerous for systems accessible over the internet.
Potential Impact
For European organizations using Quantico Tecnologia PRMV 6.48, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of their systems. Exploitation could lead to unauthorized access to sensitive administrative credentials or other critical data stored in the backend database. This could result in data breaches, unauthorized system control, or disruption of services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on PRMV for administrative or operational functions could face significant operational and reputational damage. The remote and unauthenticated nature of the attack vector increases the threat surface, especially for organizations with internet-facing PRMV instances. Additionally, the potential for data manipulation or deletion could disrupt business continuity and compliance with European data protection regulations such as GDPR, leading to legal and financial consequences.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls to reduce exposure. These include: 1) Restricting access to the /admin/login.php endpoint via network-level controls such as IP whitelisting, VPNs, or web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'username' parameter. 2) Conducting thorough input validation and sanitization on all user-supplied data, particularly the 'username' field, using parameterized queries or prepared statements if possible within the application code. 3) Monitoring logs for unusual or suspicious login attempts that may indicate exploitation attempts. 4) Isolating the PRMV system from direct internet exposure where feasible, placing it behind secure gateways or reverse proxies. 5) Preparing for rapid patch deployment by maintaining close communication with Quantico Tecnologia for updates or security advisories. 6) Conducting penetration testing and vulnerability scanning focused on SQL injection to identify and remediate similar weaknesses. These targeted measures go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-03-08T07:36:58.854Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6cef
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 4:04:44 AM
Last updated: 10/16/2025, 2:08:18 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Harvard University Breached in Oracle Zero-Day Attack
MediumF5 BIG-IP Environment Breached by Nation-State Actor
MediumNew SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
MediumHow Attackers Bypass Synced Passkeys
MediumChinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.