Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55343: n/a

0
Critical
VulnerabilityCVE-2025-55343cvecve-2025-55343
Published: Wed Nov 05 2025 (11/05/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Quipux 4.0.1 through e1774ac allows authenticated users to conduct SQL injection attacks via busqueda/busqueda.php txt_depe_codi, busqueda/busqueda.php txt_usua_codi, anexos_lista.php radi_temp, Administracion/listas/formArea_ajax.php codDepe, Administracion/listas/formDepeHijo_ajax.php codDepe, Administracion/listas/formDepePadre_ajax.php codInst, asociar_documentos/asociar_borrar_referencia.php radi_nume, asociar_documentos/asociar_documento_buscar_query.php radi_nume, asociar_documentos/asociar_documento_grabar.php txt_radi_nume, asociar_documentos/asociar_documento radi_nume, radicacion/buscar_usuario.php buscar_tipo, radicacion/formArea_ajax.php codDepe, radicacion/formDepeHijo_ajax.php codDepe, radicacion/formDepePadre_ajax.php codInst, radicacion/ver_datos_usuario.php destinatorio, reportes/reporte_TraspasoDocFisico.php verrad, tx/datos_imprimir_sobre.php txt_usua_codi, tx/datos_imprimir_sobre.php nume_radi_temp, tx/revertir_firma_digital_grabar.php txt_radi_nume, tx/tx_borrar_opcion_imp.php codigo_opc, tx/tx_realizar_tx.php txt_radicados, tx/tx_seguridad_documentos.php txt_radicados, or uploadFiles/cargar_doc_digitalizado_paginador.php txt_depe_codi.

AI-Powered Analysis

AILast updated: 11/05/2025, 19:44:30 UTC

Technical Analysis

CVE-2025-55343 is a critical SQL injection vulnerability identified in Quipux versions 4.0.1 through e1774ac. The flaw allows authenticated users to inject malicious SQL code through numerous input parameters across multiple PHP scripts, including busqueda.php, anexos_lista.php, various administrative AJAX forms, asociar_documentos scripts, radicacion scripts, reportes, and tx scripts. These parameters include txt_depe_codi, txt_usua_codi, radi_temp, codDepe, codInst, radi_nume, buscar_tipo, destinatorio, verrad, and others. The vulnerability stems from improper sanitization and validation of user-supplied input, leading to CWE-89 (SQL Injection) and CWE-74 (Improper Neutralization of Special Elements in Output). The CVSS 3.1 score of 9.9 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability with scope change. Exploiting this vulnerability could allow attackers to read, modify, or delete sensitive data, escalate privileges, or disrupt system operations. No patches or public exploits are currently available, increasing the urgency for proactive mitigation. The vulnerability affects core components of Quipux, a document and workflow management system widely used in government and enterprise environments, making it a high-value target for attackers.

Potential Impact

For European organizations, especially those in public administration, legal, or document-intensive sectors using Quipux, this vulnerability poses a severe risk. Exploitation could lead to unauthorized disclosure of sensitive documents, manipulation of official records, and disruption of critical workflows. This could result in regulatory non-compliance (e.g., GDPR violations), reputational damage, financial losses, and operational downtime. The ability for authenticated users to perform SQL injection attacks means insider threats or compromised credentials could be leveraged to cause significant harm. The broad range of affected scripts and parameters increases the attack surface, making detection and containment more challenging. Given the critical severity and potential for full database compromise, European entities must treat this vulnerability as a top priority to safeguard data integrity and availability.

Mitigation Recommendations

1. Immediately audit and restrict user privileges to the minimum necessary, limiting access to vulnerable functionalities. 2. Implement strict input validation and sanitization on all affected parameters, employing allowlists and rejecting unexpected input formats. 3. Refactor vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 4. Monitor logs for unusual database queries or errors indicative of injection attempts. 5. Deploy Web Application Firewalls (WAFs) with custom rules targeting the identified vulnerable endpoints and parameters. 6. Conduct thorough code reviews and security testing focusing on the affected PHP scripts. 7. If patches become available, prioritize their deployment in all environments. 8. Train developers and administrators on secure coding practices and the risks of SQL injection. 9. Prepare incident response plans to quickly address potential exploitation. 10. Consider network segmentation to isolate critical systems running Quipux from broader enterprise networks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ba5a1976718a733ff315c

Added to database: 11/5/2025, 7:29:37 PM

Last enriched: 11/5/2025, 7:44:30 PM

Last updated: 11/6/2025, 5:39:54 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats