Skip to main content

CVE-2025-41371: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TESI Gandia Integra Total

Critical
VulnerabilityCVE-2025-41371cvecve-2025-41371cwe-89
Published: Fri Aug 01 2025 (08/01/2025, 12:28:36 UTC)
Source: CVE Database V5
Vendor/Project: TESI
Product: Gandia Integra Total

Description

A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb_v4/integra/html/view/acceso.php

AI-Powered Analysis

AILast updated: 08/01/2025, 13:03:37 UTC

Technical Analysis

CVE-2025-41371 is a critical SQL injection vulnerability identified in TESI's Gandia Integra Total software, affecting versions from 2.1.2217.3 up to 4.4.2236.1. The vulnerability resides in the 'idestudio' parameter within the /encuestas/integraweb_v4/integra/html/view/acceso.php endpoint. An authenticated attacker can exploit this flaw to perform unauthorized SQL commands, enabling them to retrieve, create, update, or delete database records. This vulnerability stems from improper neutralization of special elements in SQL commands (CWE-89), allowing malicious input to alter the intended SQL query logic. The CVSS 4.0 base score of 9.3 reflects the high severity, with network attack vector, low attack complexity, and no privileges or user interaction required, combined with high impacts on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's characteristics suggest it could be weaponized to compromise sensitive data, disrupt services, or manipulate stored information within affected installations. Given that Gandia Integra Total is used for survey and data management, exploitation could lead to significant data breaches or operational disruptions.

Potential Impact

For European organizations using Gandia Integra Total, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive data, including personal or organizational information stored within the application databases, violating GDPR and other data protection regulations. Integrity of data could be compromised, leading to falsified records or corrupted datasets, which can affect decision-making and operational reliability. Availability may also be impacted if attackers delete or alter critical data, potentially causing downtime or loss of service. The fact that exploitation requires authentication slightly reduces risk from external attackers but does not eliminate it, as insider threats or compromised credentials could be leveraged. Organizations in sectors relying on accurate survey data or integrated data management, such as public administration, healthcare, or research institutions, may face reputational damage and regulatory penalties if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize upgrading TESI Gandia Integra Total to a version where the vulnerability is patched once available. In the interim, implement strict input validation and sanitization on the 'idestudio' parameter to prevent injection of malicious SQL code. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting this endpoint. Enforce strong authentication mechanisms and monitor for unusual access patterns or privilege escalations. Regularly audit database access logs for suspicious queries or modifications. Additionally, apply the principle of least privilege to database accounts used by the application, limiting their ability to perform destructive operations. Conduct security awareness training to reduce risks from credential compromise. Finally, maintain up-to-date backups to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:06.080Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688cb771ad5a09ad00c8e377

Added to database: 8/1/2025, 12:47:45 PM

Last enriched: 8/1/2025, 1:03:37 PM

Last updated: 9/1/2025, 10:20:55 PM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats