Skip to main content

CVE-2025-41373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TESI Gandia Integra Total

High
VulnerabilityCVE-2025-41373cvecve-2025-41373cwe-89
Published: Fri Aug 01 2025 (08/01/2025, 12:29:25 UTC)
Source: CVE Database V5
Vendor/Project: TESI
Product: Gandia Integra Total

Description

A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/hislistadoacciones.php.

AI-Powered Analysis

AILast updated: 08/01/2025, 13:03:16 UTC

Technical Analysis

CVE-2025-41373 is a high-severity SQL injection vulnerability affecting TESI's Gandia Integra Total software versions from 2.1.2217.3 up to 4.4.2236.1. The vulnerability resides in the 'idestudio' parameter within the endpoint /encuestas/integraweb[_v4]/integra/html/view/hislistadoacciones.php. An authenticated attacker with low privileges can exploit this flaw to perform unauthorized SQL commands, enabling them to retrieve, create, update, or delete database records. This vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in SQL commands, which allows injection of malicious SQL code. The CVSS v4.0 score is 8.7 (high), reflecting the network attack vector, low attack complexity, no user interaction, and the requirement of low privileges but no additional authentication barriers. The impact on confidentiality, integrity, and availability is high, as the attacker can manipulate database contents extensively. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in April 2025 and published in August 2025 by INCIBE, a Spanish cybersecurity entity, suggesting regional awareness and possibly targeted response efforts. Given the nature of the vulnerability, it poses a significant risk to organizations using the affected versions of Gandia Integra Total, especially those relying on the integrity and confidentiality of their database systems for operational or sensitive data.

Potential Impact

For European organizations using TESI Gandia Integra Total, this vulnerability poses a critical risk to data security and operational continuity. Exploitation could lead to unauthorized data disclosure, data tampering, or deletion, potentially affecting business processes, regulatory compliance (such as GDPR), and trustworthiness of information systems. Since the vulnerability requires authentication but only low privileges, insider threats or compromised user credentials could be leveraged to escalate attacks. The ability to manipulate databases could disrupt services, corrupt records, or enable further lateral movement within networks. Organizations in sectors such as education, public administration, or any domain where Gandia Integra Total is deployed for survey or data management could face significant operational disruptions and reputational damage. Additionally, the absence of patches increases the window of exposure, necessitating immediate mitigation efforts.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable endpoint and the 'idestudio' parameter to only trusted and necessary users, employing strict access controls and monitoring. 2. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the affected parameter. 3. Conduct thorough input validation and sanitization on all user-supplied data, especially the 'idestudio' parameter, to neutralize special SQL characters and prevent injection. 4. Enforce the principle of least privilege on user accounts to minimize the impact of compromised credentials. 5. Monitor logs for unusual database queries or errors indicative of injection attempts. 6. Engage with TESI for official patches or updates and plan prompt deployment once available. 7. Consider temporary compensating controls such as disabling the vulnerable functionality if feasible. 8. Perform security awareness training to reduce the risk of credential compromise that could facilitate exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:06.080Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688cb771ad5a09ad00c8e37d

Added to database: 8/1/2025, 12:47:45 PM

Last enriched: 8/1/2025, 1:03:16 PM

Last updated: 8/2/2025, 12:53:47 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats