CVE-2025-50984: n/a
diskover-web v2.3.0 Community Edition is vulnerable to multiple boolean-based blind SQL injection flaws in its Elasticsearch configuration form. Unsanitized user input in POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE and others can be crafted to inject arbitrary SQLite expressions wrapped in JSON functions. By exploiting these injection points, an attacker can infer or extract sensitive information from the underlying database without authentication. This issue stems from improper input validation and parameterization in the application's JSON-based query construction.
AI Analysis
Technical Summary
CVE-2025-50984 identifies multiple boolean-based blind SQL injection vulnerabilities in diskover-web version 2.3.0 Community Edition, specifically within its Elasticsearch configuration form. The vulnerability arises due to improper input validation and lack of parameterization in the handling of POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE, among others. These parameters accept user input that is incorporated into JSON-based queries without adequate sanitization, allowing attackers to inject arbitrary SQLite expressions. The injection is boolean-based and blind, meaning attackers can infer the presence or absence of data by observing application behavior or response times, even without direct error messages or output. Critically, exploitation does not require authentication, enabling remote attackers to extract sensitive information from the underlying database. The vulnerability stems from the application's construction of Elasticsearch queries that internally use SQLite expressions wrapped in JSON functions, which are manipulated by crafted inputs. Although no known exploits are currently reported in the wild, the flaw presents a significant risk due to the ease of exploitation and the potential for data leakage. The lack of a CVSS score indicates this is a newly published vulnerability with limited public analysis, but the technical details suggest a serious security issue that requires immediate attention.
Potential Impact
For European organizations using diskover-web v2.3.0 Community Edition, this vulnerability poses a substantial risk to confidentiality and integrity of sensitive data stored or indexed via Elasticsearch. Since the flaw allows unauthenticated attackers to perform blind SQL injection, attackers could systematically extract sensitive configuration details, credentials, or other protected information from the backend database. This could lead to further compromise of internal systems, unauthorized data disclosure, or lateral movement within networks. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal consequences if data breaches occur. Additionally, the ability to manipulate Elasticsearch configurations could disrupt availability or degrade system performance, impacting operational continuity. The vulnerability's exploitation could also undermine trust in data management and search infrastructure, critical for data-driven decision-making in European enterprises.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade diskover-web to a patched version once available from the vendor or community maintainers. In the absence of an official patch, organizations should implement strict input validation and sanitization on all Elasticsearch configuration form parameters, particularly those accepting user input in POST requests. Employing parameterized queries or prepared statements when constructing JSON-based Elasticsearch queries is essential to prevent injection. Network-level controls such as restricting access to the diskover-web interface to trusted internal IPs or VPNs can reduce exposure. Additionally, monitoring and logging of unusual query patterns or repeated failed attempts targeting the vulnerable parameters can aid in early detection of exploitation attempts. Organizations should also review and harden Elasticsearch and underlying database permissions to minimize the impact of any potential compromise. Finally, conducting a thorough security audit of all applications interfacing with Elasticsearch to identify similar injection risks is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-50984: n/a
Description
diskover-web v2.3.0 Community Edition is vulnerable to multiple boolean-based blind SQL injection flaws in its Elasticsearch configuration form. Unsanitized user input in POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE and others can be crafted to inject arbitrary SQLite expressions wrapped in JSON functions. By exploiting these injection points, an attacker can infer or extract sensitive information from the underlying database without authentication. This issue stems from improper input validation and parameterization in the application's JSON-based query construction.
AI-Powered Analysis
Technical Analysis
CVE-2025-50984 identifies multiple boolean-based blind SQL injection vulnerabilities in diskover-web version 2.3.0 Community Edition, specifically within its Elasticsearch configuration form. The vulnerability arises due to improper input validation and lack of parameterization in the handling of POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE, among others. These parameters accept user input that is incorporated into JSON-based queries without adequate sanitization, allowing attackers to inject arbitrary SQLite expressions. The injection is boolean-based and blind, meaning attackers can infer the presence or absence of data by observing application behavior or response times, even without direct error messages or output. Critically, exploitation does not require authentication, enabling remote attackers to extract sensitive information from the underlying database. The vulnerability stems from the application's construction of Elasticsearch queries that internally use SQLite expressions wrapped in JSON functions, which are manipulated by crafted inputs. Although no known exploits are currently reported in the wild, the flaw presents a significant risk due to the ease of exploitation and the potential for data leakage. The lack of a CVSS score indicates this is a newly published vulnerability with limited public analysis, but the technical details suggest a serious security issue that requires immediate attention.
Potential Impact
For European organizations using diskover-web v2.3.0 Community Edition, this vulnerability poses a substantial risk to confidentiality and integrity of sensitive data stored or indexed via Elasticsearch. Since the flaw allows unauthenticated attackers to perform blind SQL injection, attackers could systematically extract sensitive configuration details, credentials, or other protected information from the backend database. This could lead to further compromise of internal systems, unauthorized data disclosure, or lateral movement within networks. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal consequences if data breaches occur. Additionally, the ability to manipulate Elasticsearch configurations could disrupt availability or degrade system performance, impacting operational continuity. The vulnerability's exploitation could also undermine trust in data management and search infrastructure, critical for data-driven decision-making in European enterprises.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade diskover-web to a patched version once available from the vendor or community maintainers. In the absence of an official patch, organizations should implement strict input validation and sanitization on all Elasticsearch configuration form parameters, particularly those accepting user input in POST requests. Employing parameterized queries or prepared statements when constructing JSON-based Elasticsearch queries is essential to prevent injection. Network-level controls such as restricting access to the diskover-web interface to trusted internal IPs or VPNs can reduce exposure. Additionally, monitoring and logging of unusual query patterns or repeated failed attempts targeting the vulnerable parameters can aid in early detection of exploitation attempts. Organizations should also review and harden Elasticsearch and underlying database permissions to minimize the impact of any potential compromise. Finally, conducting a thorough security audit of all applications interfacing with Elasticsearch to identify similar injection risks is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68af28a6ad5a09ad00637382
Added to database: 8/27/2025, 3:47:50 PM
Last enriched: 8/27/2025, 4:02:49 PM
Last updated: 10/12/2025, 5:24:26 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11638: Denial of Service in Tomofun Furbo 360
MediumCVE-2025-11637: Race Condition in Tomofun Furbo 360
MediumCVE-2025-11636: Server-Side Request Forgery in Tomofun Furbo 360
MediumCVE-2025-11635: Resource Consumption in Tomofun Furbo 360
MediumCVE-2025-33096: CWE-674 Uncontrolled Recursion in IBM Engineering Requirements Management Doors Next
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.