Skip to main content

CVE-2025-4650: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon web

High
VulnerabilityCVE-2025-4650cvecve-2025-4650cwe-89
Published: Fri Aug 22 2025 (08/22/2025, 18:50:42 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: web

Description

User with high privileges is able to introduce a SQLi using the Meta Service indicator page. Caused by an Improper Neutralization of Special Elements used in an SQL Command.This issue affects web: from 24.10.0 before 24.10.9, from 24.04.0 before 24.04.16, from 23.10.0 before 23.10.26.

AI-Powered Analysis

AILast updated: 08/22/2025, 19:17:58 UTC

Technical Analysis

CVE-2025-4650 is a high-severity SQL Injection vulnerability (CWE-89) affecting the Centreon web application versions 23.10.0 before 23.10.26, 24.04.0 before 24.04.16, and 24.10.0 before 24.10.9. Centreon is a widely used IT infrastructure monitoring software. The vulnerability arises from improper neutralization of special elements in SQL commands on the Meta Service indicator page, allowing a user with high privileges to inject malicious SQL code. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, modification, or deletion, and even full compromise of the database integrity and availability. The CVSS 3.1 base score is 7.2, reflecting network exploitable (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially in environments where Centreon is deployed for critical monitoring functions. The vulnerability specifically affects the web interface, which is a common attack vector, and the requirement for high privileges means that attackers must already have some level of access, but can escalate their capabilities substantially through exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-4650 can be severe, particularly for enterprises and public sector entities relying on Centreon for monitoring critical IT infrastructure. Exploitation could lead to unauthorized disclosure of sensitive monitoring data, manipulation or deletion of monitoring configurations, and disruption of monitoring services, potentially causing blind spots in IT operations and delaying incident response. This could affect confidentiality, integrity, and availability of monitoring data, undermining trust in IT systems and compliance with regulations such as GDPR. Additionally, attackers could leverage the vulnerability to pivot into other parts of the network, increasing the risk of broader compromise. Given the high privileges required, insider threats or compromised administrative accounts pose a significant risk vector. The disruption of monitoring services could also impact operational continuity in sectors like finance, healthcare, and energy, which are critical in Europe.

Mitigation Recommendations

To mitigate CVE-2025-4650, European organizations should: 1) Immediately upgrade Centreon web to the latest patched versions (24.10.9, 24.04.16, or 23.10.26) as soon as they become available. 2) Restrict high-privilege user access to the Centreon web interface using strict role-based access controls and multi-factor authentication to reduce the risk of privilege misuse. 3) Implement network segmentation and firewall rules to limit access to the Centreon web interface only to trusted administrative networks. 4) Monitor logs for unusual SQL query patterns or unexpected database errors that could indicate attempted exploitation. 5) Conduct regular security audits and penetration testing focused on the Centreon environment to detect potential injection points. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the Meta Service indicator page. 7) Educate administrators on the risks of SQL injection and the importance of secure coding and configuration practices. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-05-13T11:40:55.019Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a8bed7ad5a09ad00216461

Added to database: 8/22/2025, 7:02:47 PM

Last enriched: 8/22/2025, 7:17:58 PM

Last updated: 8/22/2025, 7:17:58 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats