Skip to main content

CVE-2025-41377: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TESI Gandia Integra Total

High
VulnerabilityCVE-2025-41377cvecve-2025-41377cwe-89
Published: Fri May 23 2025 (05/23/2025, 12:37:48 UTC)
Source: CVE
Vendor/Project: TESI
Product: Gandia Integra Total

Description

A SQL injection vulnerability has been found in Gandia Integra Total of TESI from version 2.1.2217.3 to v4.4.2236.1. The vulnerability allows an authenticated attacker to retrieve, create, update and delete databases through the 'idestudio' parameter in /encuestas/integraweb[_v4]/integra/html/view/consultacuotasred.php.

AI-Powered Analysis

AILast updated: 08/02/2025, 00:37:57 UTC

Technical Analysis

CVE-2025-41377 is a high-severity SQL injection vulnerability identified in TESI's Gandia Integra Total software versions from 2.1.2217.3 up to 4.4.2236.1. The flaw exists in the 'idestudio' parameter within the PHP script located at /encuestas/integraweb[_v4]/integra/html/view/consultacuotasred.php. This parameter is improperly sanitized, allowing an authenticated attacker to inject malicious SQL commands. Exploitation enables the attacker to perform unauthorized actions on the backend database, including retrieving sensitive data, creating new records, updating existing entries, or deleting data. The vulnerability requires the attacker to have some level of authenticated access (low privileges) but does not require user interaction beyond that. The CVSS 4.0 score of 8.7 reflects the vulnerability's network exploitability (no physical or local access needed), low attack complexity, and the significant impact on confidentiality, integrity, and availability of the affected systems. The vulnerability does not currently have known exploits in the wild, but the absence of patches increases the risk of future exploitation. The CWE-89 classification confirms this is a classic SQL injection due to improper neutralization of special elements in SQL commands, a well-understood and critical web application security flaw.

Potential Impact

For European organizations using TESI's Gandia Integra Total, this vulnerability poses a substantial risk. The ability to manipulate database contents can lead to exposure of sensitive personal or business data, violating GDPR and other data protection regulations. Data integrity could be compromised, potentially affecting operational processes, reporting accuracy, and decision-making. Availability impacts may arise if attackers delete or corrupt critical data, disrupting services. Given the authenticated nature of the exploit, insider threats or compromised user credentials could be leveraged to exploit this vulnerability. Organizations in sectors such as education, government, or enterprises relying on Gandia Integra Total for survey or data management functions are particularly at risk. The lack of patches means organizations must rely on compensating controls to mitigate risk until official fixes are available.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable endpoint to only trusted users and networks, employing network segmentation and strict access controls. 2. Implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'idestudio' parameter. 3. Enforce strong authentication mechanisms and monitor for unusual login patterns to reduce the risk of credential compromise. 4. Conduct thorough input validation and parameterized queries or prepared statements in the application code to prevent injection, if source code access and modification are possible. 5. Regularly audit and monitor database logs for suspicious queries or unauthorized data manipulation. 6. Engage with TESI to obtain patches or updates as soon as they become available and plan for prompt deployment. 7. Consider temporary disabling or limiting functionality of the affected module if feasible until a patch is applied. 8. Educate users about phishing and credential security to reduce the risk of initial access by attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:07.297Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68306f8e0acd01a2492723a0

Added to database: 5/23/2025, 12:52:30 PM

Last enriched: 8/2/2025, 12:37:57 AM

Last updated: 8/18/2025, 1:22:22 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats