Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22217: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VMware AVI Load Balancer

0
High
VulnerabilityCVE-2025-22217cvecve-2025-22217cwe-89
Published: Tue Jan 28 2025 (01/28/2025, 18:33:36 UTC)
Source: CVE Database V5
Product: VMware AVI Load Balancer

Description

Avi Load Balancer contains an unauthenticated blind SQL Injection vulnerability which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.  A malicious user with network access may be able to use specially crafted SQL queries to gain database access.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:32:43 UTC

Technical Analysis

CVE-2025-22217 is an unauthenticated blind SQL Injection vulnerability identified in VMware AVI Load Balancer versions 30.1.x and 30.2.x. The vulnerability arises due to improper neutralization of special elements used in SQL commands (CWE-89), allowing an attacker with network access to inject malicious SQL queries directly into the backend database. Being unauthenticated means no credentials are required, and no user interaction is necessary, making exploitation relatively straightforward for an attacker who can reach the vulnerable service. The vulnerability is classified as blind SQL Injection, indicating that the attacker may not receive direct query results but can infer data through side effects or timing attacks. The CVSS v3.1 base score is 8.6 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change with high confidentiality impact but no impact on integrity or availability. Although no public exploits are known at this time, the potential for data leakage is significant, especially in environments where the load balancer manages sensitive application traffic. VMware has released patches to address this issue, emphasizing the need for immediate remediation. The vulnerability was privately reported and reserved in early January 2025, with public disclosure in late January 2025.

Potential Impact

The primary impact of CVE-2025-22217 is unauthorized disclosure of sensitive information stored in the backend database of VMware AVI Load Balancer deployments. Attackers exploiting this vulnerability can extract confidential data, potentially including configuration details, credentials, or traffic metadata, which can facilitate further attacks or data breaches. Although the vulnerability does not directly affect data integrity or system availability, the confidentiality breach alone can have severe consequences, including regulatory non-compliance, reputational damage, and operational risks. Organizations relying on VMware AVI Load Balancer for critical application delivery may face increased risk of targeted attacks, especially if the load balancer is exposed to untrusted networks. The unauthenticated nature and low complexity of exploitation increase the likelihood of attack attempts once the vulnerability becomes widely known. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-22217, organizations should promptly apply the official patches released by VMware for AVI Load Balancer versions 30.1.x and 30.2.x. Until patching is complete, network-level controls should be implemented to restrict access to the load balancer management interfaces and APIs, limiting exposure to trusted internal networks only. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules designed to detect and block SQL Injection patterns targeting the load balancer. Conduct thorough logging and monitoring of database queries and network traffic to identify anomalous or suspicious activity indicative of exploitation attempts. Review and harden database permissions to minimize the impact of any successful injection. Additionally, perform regular security assessments and penetration testing focused on the load balancer environment to detect similar vulnerabilities. Maintain an incident response plan tailored to SQL Injection attacks to enable rapid containment and remediation if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2025-01-02T04:29:30.444Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a45185912abc71d65662

Added to database: 2/26/2026, 7:51:45 PM

Last enriched: 2/26/2026, 8:32:43 PM

Last updated: 2/26/2026, 11:15:07 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses