CVE-2025-4650: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon web
User with high privileges is able to introduce a SQLi using the Meta Service indicator page. Caused by an Improper Neutralization of Special Elements used in an SQL Command.This issue affects web: from 24.10.0 before 24.10.9, from 24.04.0 before 24.04.16, from 23.10.0 before 23.10.26.
AI Analysis
Technical Summary
CVE-2025-4650 is a high-severity SQL Injection vulnerability (CWE-89) affecting the Centreon web application versions 23.10.0 before 23.10.26, 24.04.0 before 24.04.16, and 24.10.0 before 24.10.9. Centreon is a widely used IT infrastructure monitoring software. The vulnerability arises from improper neutralization of special elements in SQL commands on the Meta Service indicator page, allowing a user with high privileges to inject malicious SQL code. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, modification, or deletion, and even full compromise of the database integrity and availability. The CVSS 3.1 base score is 7.2, reflecting network exploitable (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially in environments where Centreon is deployed for critical monitoring functions. The vulnerability specifically affects the web interface, which is a common attack vector, and the requirement for high privileges means that attackers must already have some level of access, but can escalate their capabilities substantially through exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-4650 can be severe, particularly for enterprises and public sector entities relying on Centreon for monitoring critical IT infrastructure. Exploitation could lead to unauthorized disclosure of sensitive monitoring data, manipulation or deletion of monitoring configurations, and disruption of monitoring services, potentially causing blind spots in IT operations and delaying incident response. This could affect confidentiality, integrity, and availability of monitoring data, undermining trust in IT systems and compliance with regulations such as GDPR. Additionally, attackers could leverage the vulnerability to pivot into other parts of the network, increasing the risk of broader compromise. Given the high privileges required, insider threats or compromised administrative accounts pose a significant risk vector. The disruption of monitoring services could also impact operational continuity in sectors like finance, healthcare, and energy, which are critical in Europe.
Mitigation Recommendations
To mitigate CVE-2025-4650, European organizations should: 1) Immediately upgrade Centreon web to the latest patched versions (24.10.9, 24.04.16, or 23.10.26) as soon as they become available. 2) Restrict high-privilege user access to the Centreon web interface using strict role-based access controls and multi-factor authentication to reduce the risk of privilege misuse. 3) Implement network segmentation and firewall rules to limit access to the Centreon web interface only to trusted administrative networks. 4) Monitor logs for unusual SQL query patterns or unexpected database errors that could indicate attempted exploitation. 5) Conduct regular security audits and penetration testing focused on the Centreon environment to detect potential injection points. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the Meta Service indicator page. 7) Educate administrators on the risks of SQL injection and the importance of secure coding and configuration practices. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-4650: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon web
Description
User with high privileges is able to introduce a SQLi using the Meta Service indicator page. Caused by an Improper Neutralization of Special Elements used in an SQL Command.This issue affects web: from 24.10.0 before 24.10.9, from 24.04.0 before 24.04.16, from 23.10.0 before 23.10.26.
AI-Powered Analysis
Technical Analysis
CVE-2025-4650 is a high-severity SQL Injection vulnerability (CWE-89) affecting the Centreon web application versions 23.10.0 before 23.10.26, 24.04.0 before 24.04.16, and 24.10.0 before 24.10.9. Centreon is a widely used IT infrastructure monitoring software. The vulnerability arises from improper neutralization of special elements in SQL commands on the Meta Service indicator page, allowing a user with high privileges to inject malicious SQL code. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, modification, or deletion, and even full compromise of the database integrity and availability. The CVSS 3.1 base score is 7.2, reflecting network exploitable (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild yet, the vulnerability's characteristics make it a significant risk, especially in environments where Centreon is deployed for critical monitoring functions. The vulnerability specifically affects the web interface, which is a common attack vector, and the requirement for high privileges means that attackers must already have some level of access, but can escalate their capabilities substantially through exploitation.
Potential Impact
For European organizations, the impact of CVE-2025-4650 can be severe, particularly for enterprises and public sector entities relying on Centreon for monitoring critical IT infrastructure. Exploitation could lead to unauthorized disclosure of sensitive monitoring data, manipulation or deletion of monitoring configurations, and disruption of monitoring services, potentially causing blind spots in IT operations and delaying incident response. This could affect confidentiality, integrity, and availability of monitoring data, undermining trust in IT systems and compliance with regulations such as GDPR. Additionally, attackers could leverage the vulnerability to pivot into other parts of the network, increasing the risk of broader compromise. Given the high privileges required, insider threats or compromised administrative accounts pose a significant risk vector. The disruption of monitoring services could also impact operational continuity in sectors like finance, healthcare, and energy, which are critical in Europe.
Mitigation Recommendations
To mitigate CVE-2025-4650, European organizations should: 1) Immediately upgrade Centreon web to the latest patched versions (24.10.9, 24.04.16, or 23.10.26) as soon as they become available. 2) Restrict high-privilege user access to the Centreon web interface using strict role-based access controls and multi-factor authentication to reduce the risk of privilege misuse. 3) Implement network segmentation and firewall rules to limit access to the Centreon web interface only to trusted administrative networks. 4) Monitor logs for unusual SQL query patterns or unexpected database errors that could indicate attempted exploitation. 5) Conduct regular security audits and penetration testing focused on the Centreon environment to detect potential injection points. 6) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the Meta Service indicator page. 7) Educate administrators on the risks of SQL injection and the importance of secure coding and configuration practices. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Centreon
- Date Reserved
- 2025-05-13T11:40:55.019Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a8bed7ad5a09ad00216461
Added to database: 8/22/2025, 7:02:47 PM
Last enriched: 8/22/2025, 7:17:58 PM
Last updated: 8/22/2025, 7:17:58 PM
Views: 2
Related Threats
CVE-2025-57801: CWE-347: Improper Verification of Cryptographic Signature in Consensys gnark
HighCVE-2025-50859: n/a
HighCVE-2025-50858: n/a
HighCVE-2025-55454: n/a
HighCVE-2025-51092: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.