Skip to main content

CVE-2025-50984: n/a

Medium
VulnerabilityCVE-2025-50984cvecve-2025-50984
Published: Wed Aug 27 2025 (08/27/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

diskover-web v2.3.0 Community Edition is vulnerable to multiple boolean-based blind SQL injection flaws in its Elasticsearch configuration form. Unsanitized user input in POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE and others can be crafted to inject arbitrary SQLite expressions wrapped in JSON functions. By exploiting these injection points, an attacker can infer or extract sensitive information from the underlying database without authentication. This issue stems from improper input validation and parameterization in the application's JSON-based query construction.

AI-Powered Analysis

AILast updated: 08/27/2025, 16:02:49 UTC

Technical Analysis

CVE-2025-50984 identifies multiple boolean-based blind SQL injection vulnerabilities in diskover-web version 2.3.0 Community Edition, specifically within its Elasticsearch configuration form. The vulnerability arises due to improper input validation and lack of parameterization in the handling of POST parameters such as ES_PASS, ES_MAXSIZE, ES_TRANSLOGSIZE, ES_TIMEOUT, ES_USER, ES_HOST, ES_PORT, ES_SCROLLSIZE, ES_CHUNKSIZE, among others. These parameters accept user input that is incorporated into JSON-based queries without adequate sanitization, allowing attackers to inject arbitrary SQLite expressions. The injection is boolean-based and blind, meaning attackers can infer the presence or absence of data by observing application behavior or response times, even without direct error messages or output. Critically, exploitation does not require authentication, enabling remote attackers to extract sensitive information from the underlying database. The vulnerability stems from the application's construction of Elasticsearch queries that internally use SQLite expressions wrapped in JSON functions, which are manipulated by crafted inputs. Although no known exploits are currently reported in the wild, the flaw presents a significant risk due to the ease of exploitation and the potential for data leakage. The lack of a CVSS score indicates this is a newly published vulnerability with limited public analysis, but the technical details suggest a serious security issue that requires immediate attention.

Potential Impact

For European organizations using diskover-web v2.3.0 Community Edition, this vulnerability poses a substantial risk to confidentiality and integrity of sensitive data stored or indexed via Elasticsearch. Since the flaw allows unauthenticated attackers to perform blind SQL injection, attackers could systematically extract sensitive configuration details, credentials, or other protected information from the backend database. This could lead to further compromise of internal systems, unauthorized data disclosure, or lateral movement within networks. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened compliance risks and potential legal consequences if data breaches occur. Additionally, the ability to manipulate Elasticsearch configurations could disrupt availability or degrade system performance, impacting operational continuity. The vulnerability's exploitation could also undermine trust in data management and search infrastructure, critical for data-driven decision-making in European enterprises.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade diskover-web to a patched version once available from the vendor or community maintainers. In the absence of an official patch, organizations should implement strict input validation and sanitization on all Elasticsearch configuration form parameters, particularly those accepting user input in POST requests. Employing parameterized queries or prepared statements when constructing JSON-based Elasticsearch queries is essential to prevent injection. Network-level controls such as restricting access to the diskover-web interface to trusted internal IPs or VPNs can reduce exposure. Additionally, monitoring and logging of unusual query patterns or repeated failed attempts targeting the vulnerable parameters can aid in early detection of exploitation attempts. Organizations should also review and harden Elasticsearch and underlying database permissions to minimize the impact of any potential compromise. Finally, conducting a thorough security audit of all applications interfacing with Elasticsearch to identify similar injection risks is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68af28a6ad5a09ad00637382

Added to database: 8/27/2025, 3:47:50 PM

Last enriched: 8/27/2025, 4:02:49 PM

Last updated: 8/28/2025, 12:34:05 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats