CVE-2025-41371: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TESI Gandia Integra Total
A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb_v4/integra/html/view/acceso.php
AI Analysis
Technical Summary
CVE-2025-41371 is a critical SQL injection vulnerability identified in TESI's Gandia Integra Total software, affecting versions from 2.1.2217.3 up to 4.4.2236.1. The vulnerability resides in the 'idestudio' parameter within the /encuestas/integraweb_v4/integra/html/view/acceso.php endpoint. An authenticated attacker can exploit this flaw to perform unauthorized SQL commands, enabling them to retrieve, create, update, or delete database records. This vulnerability stems from improper neutralization of special elements in SQL commands (CWE-89), allowing malicious input to alter the intended SQL query logic. The CVSS 4.0 base score of 9.3 reflects the high severity, with network attack vector, low attack complexity, and no privileges or user interaction required, combined with high impacts on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's characteristics suggest it could be weaponized to compromise sensitive data, disrupt services, or manipulate stored information within affected installations. Given that Gandia Integra Total is used for survey and data management, exploitation could lead to significant data breaches or operational disruptions.
Potential Impact
For European organizations using Gandia Integra Total, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive data, including personal or organizational information stored within the application databases, violating GDPR and other data protection regulations. Integrity of data could be compromised, leading to falsified records or corrupted datasets, which can affect decision-making and operational reliability. Availability may also be impacted if attackers delete or alter critical data, potentially causing downtime or loss of service. The fact that exploitation requires authentication slightly reduces risk from external attackers but does not eliminate it, as insider threats or compromised credentials could be leveraged. Organizations in sectors relying on accurate survey data or integrated data management, such as public administration, healthcare, or research institutions, may face reputational damage and regulatory penalties if exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize upgrading TESI Gandia Integra Total to a version where the vulnerability is patched once available. In the interim, implement strict input validation and sanitization on the 'idestudio' parameter to prevent injection of malicious SQL code. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting this endpoint. Enforce strong authentication mechanisms and monitor for unusual access patterns or privilege escalations. Regularly audit database access logs for suspicious queries or modifications. Additionally, apply the principle of least privilege to database accounts used by the application, limiting their ability to perform destructive operations. Conduct security awareness training to reduce risks from credential compromise. Finally, maintain up-to-date backups to enable recovery in case of data tampering or loss.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2025-41371: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TESI Gandia Integra Total
Description
A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb_v4/integra/html/view/acceso.php
AI-Powered Analysis
Technical Analysis
CVE-2025-41371 is a critical SQL injection vulnerability identified in TESI's Gandia Integra Total software, affecting versions from 2.1.2217.3 up to 4.4.2236.1. The vulnerability resides in the 'idestudio' parameter within the /encuestas/integraweb_v4/integra/html/view/acceso.php endpoint. An authenticated attacker can exploit this flaw to perform unauthorized SQL commands, enabling them to retrieve, create, update, or delete database records. This vulnerability stems from improper neutralization of special elements in SQL commands (CWE-89), allowing malicious input to alter the intended SQL query logic. The CVSS 4.0 base score of 9.3 reflects the high severity, with network attack vector, low attack complexity, and no privileges or user interaction required, combined with high impacts on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's characteristics suggest it could be weaponized to compromise sensitive data, disrupt services, or manipulate stored information within affected installations. Given that Gandia Integra Total is used for survey and data management, exploitation could lead to significant data breaches or operational disruptions.
Potential Impact
For European organizations using Gandia Integra Total, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive data, including personal or organizational information stored within the application databases, violating GDPR and other data protection regulations. Integrity of data could be compromised, leading to falsified records or corrupted datasets, which can affect decision-making and operational reliability. Availability may also be impacted if attackers delete or alter critical data, potentially causing downtime or loss of service. The fact that exploitation requires authentication slightly reduces risk from external attackers but does not eliminate it, as insider threats or compromised credentials could be leveraged. Organizations in sectors relying on accurate survey data or integrated data management, such as public administration, healthcare, or research institutions, may face reputational damage and regulatory penalties if exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should prioritize upgrading TESI Gandia Integra Total to a version where the vulnerability is patched once available. In the interim, implement strict input validation and sanitization on the 'idestudio' parameter to prevent injection of malicious SQL code. Employ web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting this endpoint. Enforce strong authentication mechanisms and monitor for unusual access patterns or privilege escalations. Regularly audit database access logs for suspicious queries or modifications. Additionally, apply the principle of least privilege to database accounts used by the application, limiting their ability to perform destructive operations. Conduct security awareness training to reduce risks from credential compromise. Finally, maintain up-to-date backups to enable recovery in case of data tampering or loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:57:06.080Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 688cb771ad5a09ad00c8e377
Added to database: 8/1/2025, 12:47:45 PM
Last enriched: 8/1/2025, 1:03:37 PM
Last updated: 10/17/2025, 6:43:57 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62505: CWE-918: Server-Side Request Forgery (SSRF) in lobehub lobe-chat
LowCVE-2025-56320: n/a
UnknownCVE-2025-56316: n/a
UnknownCVE-2025-56218: n/a
UnknownCVE-2025-60514: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.