CVE-2025-46053: n/a
A SQL Injection vulnerability in WebERP v4.15.2 allows attackers to execute arbitrary SQL commands and extract sensitive data by injecting a crafted payload into the ReportID and ReplaceReportID parameters within a POST request to /reportwriter/admin/ReportCreator.php
AI Analysis
Technical Summary
CVE-2025-46053 is a SQL Injection vulnerability identified in WebERP version 4.15.2. This vulnerability arises from improper sanitization of user-supplied input in the ReportID and ReplaceReportID parameters within POST requests to the /reportwriter/admin/ReportCreator.php endpoint. An attacker can exploit this flaw by crafting malicious SQL payloads injected into these parameters, which the backend database executes. This allows unauthorized execution of arbitrary SQL commands, potentially enabling attackers to extract sensitive data from the database. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score is 5.1, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N. This means the attack requires local access (AV:L), has low complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent but does not affect availability. The vulnerability is categorized under CWE-89, which corresponds to SQL Injection. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on April 22, 2025, and published on May 15, 2025. Given the nature of WebERP as an open-source ERP system used primarily by small to medium enterprises for financial and business management, exploitation could lead to unauthorized data disclosure and potential manipulation of business-critical data.
Potential Impact
For European organizations using WebERP 4.15.2, this vulnerability poses a risk of unauthorized data disclosure and potential data integrity compromise. Since ERP systems often contain sensitive financial, customer, and operational data, exploitation could lead to leakage of confidential business information, impacting compliance with data protection regulations such as GDPR. The limited impact on availability reduces the risk of operational disruption but does not eliminate the risk of reputational damage or regulatory penalties. Organizations in sectors relying heavily on ERP systems for financial reporting, supply chain management, or customer data management could face targeted exploitation attempts, especially if the system is accessible locally or within internal networks. The requirement for local access reduces the risk from remote attackers but increases the threat from insider threats or attackers who have gained initial footholds within the network.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all WebERP installations to identify instances running version 4.15.2 and restrict access to the /reportwriter/admin/ReportCreator.php endpoint to trusted administrators only, preferably via network segmentation and access control lists. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the ReportID and ReplaceReportID parameters. 3) Monitor logs for unusual or malformed POST requests to the vulnerable endpoint to detect potential exploitation attempts. 4) Since no official patch is currently available, consider applying temporary code-level mitigations such as input validation and parameterized queries for the affected parameters if source code access and development resources are available. 5) Educate internal users and administrators about the risk of local exploitation and enforce strict privilege management to minimize the number of users with access to vulnerable components. 6) Plan for timely patching once an official fix is released and incorporate this vulnerability into vulnerability management and incident response processes.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-46053: n/a
Description
A SQL Injection vulnerability in WebERP v4.15.2 allows attackers to execute arbitrary SQL commands and extract sensitive data by injecting a crafted payload into the ReportID and ReplaceReportID parameters within a POST request to /reportwriter/admin/ReportCreator.php
AI-Powered Analysis
Technical Analysis
CVE-2025-46053 is a SQL Injection vulnerability identified in WebERP version 4.15.2. This vulnerability arises from improper sanitization of user-supplied input in the ReportID and ReplaceReportID parameters within POST requests to the /reportwriter/admin/ReportCreator.php endpoint. An attacker can exploit this flaw by crafting malicious SQL payloads injected into these parameters, which the backend database executes. This allows unauthorized execution of arbitrary SQL commands, potentially enabling attackers to extract sensitive data from the database. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score is 5.1, indicating a medium severity level, with the vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N. This means the attack requires local access (AV:L), has low complexity (AC:L), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent but does not affect availability. The vulnerability is categorized under CWE-89, which corresponds to SQL Injection. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on April 22, 2025, and published on May 15, 2025. Given the nature of WebERP as an open-source ERP system used primarily by small to medium enterprises for financial and business management, exploitation could lead to unauthorized data disclosure and potential manipulation of business-critical data.
Potential Impact
For European organizations using WebERP 4.15.2, this vulnerability poses a risk of unauthorized data disclosure and potential data integrity compromise. Since ERP systems often contain sensitive financial, customer, and operational data, exploitation could lead to leakage of confidential business information, impacting compliance with data protection regulations such as GDPR. The limited impact on availability reduces the risk of operational disruption but does not eliminate the risk of reputational damage or regulatory penalties. Organizations in sectors relying heavily on ERP systems for financial reporting, supply chain management, or customer data management could face targeted exploitation attempts, especially if the system is accessible locally or within internal networks. The requirement for local access reduces the risk from remote attackers but increases the threat from insider threats or attackers who have gained initial footholds within the network.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit all WebERP installations to identify instances running version 4.15.2 and restrict access to the /reportwriter/admin/ReportCreator.php endpoint to trusted administrators only, preferably via network segmentation and access control lists. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the ReportID and ReplaceReportID parameters. 3) Monitor logs for unusual or malformed POST requests to the vulnerable endpoint to detect potential exploitation attempts. 4) Since no official patch is currently available, consider applying temporary code-level mitigations such as input validation and parameterized queries for the affected parameters if source code access and development resources are available. 5) Educate internal users and administrators about the risk of local exploitation and enforce strict privilege management to minimize the number of users with access to vulnerable components. 6) Plan for timely patching once an official fix is released and incorporate this vulnerability into vulnerability management and incident response processes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb501
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 4:50:04 PM
Last updated: 7/31/2025, 3:29:42 AM
Views: 14
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.