Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47954: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Microsoft Microsoft SQL Server 2022 (CU 20)

0
High
VulnerabilityCVE-2025-47954cvecve-2025-47954cwe-89
Published: Tue Aug 12 2025 (08/12/2025, 17:10:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft SQL Server 2022 (CU 20)

Description

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:47:49 UTC

Technical Analysis

CVE-2025-47954 is a vulnerability classified under CWE-89, indicating an SQL injection flaw in Microsoft SQL Server 2022 (CU 20). The issue arises from improper neutralization of special elements in SQL commands, allowing an attacker with authorized access to inject malicious SQL code. This can be exploited remotely over a network without requiring user interaction, enabling the attacker to escalate privileges within the database environment. The vulnerability affects version 16.0.0.0 of SQL Server 2022 and has been assigned a CVSS v3.1 score of 8.8, reflecting its high severity. The attack vector is network-based with low attack complexity and requires privileges but no user interaction. Successful exploitation can compromise confidentiality by exposing sensitive data, integrity by altering or deleting data, and availability by disrupting database operations. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be leveraged for significant damage, especially in environments where SQL Server is exposed to potentially untrusted users or applications. The lack of available patches at the time of publication necessitates immediate risk mitigation through configuration and access controls.

Potential Impact

The vulnerability poses a significant risk to organizations relying on Microsoft SQL Server 2022, particularly those with network-exposed database instances. Exploitation can lead to unauthorized data access, data manipulation, and potential denial of service, severely impacting business operations. Confidentiality breaches could expose sensitive customer or proprietary information, while integrity violations could corrupt critical data, undermining trust and compliance with regulations such as GDPR or HIPAA. Availability impacts could disrupt services dependent on the database, causing operational downtime and financial losses. Given SQL Server's widespread use in enterprise, government, and cloud environments, the threat could affect a broad range of sectors including finance, healthcare, retail, and public administration. The requirement for authorized access limits the attack surface but does not eliminate risk, especially in environments with weak internal controls or compromised credentials.

Mitigation Recommendations

Organizations should prioritize applying official patches from Microsoft as soon as they become available for SQL Server 2022 CU 20. Until patches are released, implement strict input validation and parameterized queries to prevent injection of malicious SQL code. Review and enforce the principle of least privilege by restricting database user permissions to the minimum necessary for their roles. Monitor database logs and network traffic for unusual or suspicious activity indicative of SQL injection attempts. Employ network segmentation and firewall rules to limit exposure of SQL Server instances to only trusted networks and users. Conduct regular security assessments and code reviews of applications interacting with the database to identify and remediate injection vulnerabilities. Additionally, consider deploying Web Application Firewalls (WAFs) or database activity monitoring tools that can detect and block SQL injection attempts in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.463Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b7749ad5a09ad003490f1

Added to database: 8/12/2025, 5:18:01 PM

Last enriched: 2/27/2026, 2:47:49 AM

Last updated: 3/26/2026, 11:14:19 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses