CVE-2025-55343: n/a
Quipux 4.0.1 through e1774ac allows authenticated users to conduct SQL injection attacks via busqueda/busqueda.php txt_depe_codi, busqueda/busqueda.php txt_usua_codi, anexos_lista.php radi_temp, Administracion/listas/formArea_ajax.php codDepe, Administracion/listas/formDepeHijo_ajax.php codDepe, Administracion/listas/formDepePadre_ajax.php codInst, asociar_documentos/asociar_borrar_referencia.php radi_nume, asociar_documentos/asociar_documento_buscar_query.php radi_nume, asociar_documentos/asociar_documento_grabar.php txt_radi_nume, asociar_documentos/asociar_documento radi_nume, radicacion/buscar_usuario.php buscar_tipo, radicacion/formArea_ajax.php codDepe, radicacion/formDepeHijo_ajax.php codDepe, radicacion/formDepePadre_ajax.php codInst, radicacion/ver_datos_usuario.php destinatorio, reportes/reporte_TraspasoDocFisico.php verrad, tx/datos_imprimir_sobre.php txt_usua_codi, tx/datos_imprimir_sobre.php nume_radi_temp, tx/revertir_firma_digital_grabar.php txt_radi_nume, tx/tx_borrar_opcion_imp.php codigo_opc, tx/tx_realizar_tx.php txt_radicados, tx/tx_seguridad_documentos.php txt_radicados, or uploadFiles/cargar_doc_digitalizado_paginador.php txt_depe_codi.
AI Analysis
Technical Summary
CVE-2025-55343 is a critical SQL injection vulnerability identified in Quipux versions 4.0.1 through e1774ac. The flaw allows authenticated users to inject malicious SQL code through numerous input parameters across multiple PHP scripts, including busqueda.php, anexos_lista.php, various administrative AJAX forms, asociar_documentos scripts, radicacion scripts, reportes, and tx scripts. These parameters include txt_depe_codi, txt_usua_codi, radi_temp, codDepe, codInst, radi_nume, buscar_tipo, destinatorio, verrad, and others. The vulnerability stems from improper sanitization and validation of user-supplied input, leading to CWE-89 (SQL Injection) and CWE-74 (Improper Neutralization of Special Elements in Output). The CVSS 3.1 score of 9.9 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability with scope change. Exploiting this vulnerability could allow attackers to read, modify, or delete sensitive data, escalate privileges, or disrupt system operations. No patches or public exploits are currently available, increasing the urgency for proactive mitigation. The vulnerability affects core components of Quipux, a document and workflow management system widely used in government and enterprise environments, making it a high-value target for attackers.
Potential Impact
For European organizations, especially those in public administration, legal, or document-intensive sectors using Quipux, this vulnerability poses a severe risk. Exploitation could lead to unauthorized disclosure of sensitive documents, manipulation of official records, and disruption of critical workflows. This could result in regulatory non-compliance (e.g., GDPR violations), reputational damage, financial losses, and operational downtime. The ability for authenticated users to perform SQL injection attacks means insider threats or compromised credentials could be leveraged to cause significant harm. The broad range of affected scripts and parameters increases the attack surface, making detection and containment more challenging. Given the critical severity and potential for full database compromise, European entities must treat this vulnerability as a top priority to safeguard data integrity and availability.
Mitigation Recommendations
1. Immediately audit and restrict user privileges to the minimum necessary, limiting access to vulnerable functionalities. 2. Implement strict input validation and sanitization on all affected parameters, employing allowlists and rejecting unexpected input formats. 3. Refactor vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 4. Monitor logs for unusual database queries or errors indicative of injection attempts. 5. Deploy Web Application Firewalls (WAFs) with custom rules targeting the identified vulnerable endpoints and parameters. 6. Conduct thorough code reviews and security testing focusing on the affected PHP scripts. 7. If patches become available, prioritize their deployment in all environments. 8. Train developers and administrators on secure coding practices and the risks of SQL injection. 9. Prepare incident response plans to quickly address potential exploitation. 10. Consider network segmentation to isolate critical systems running Quipux from broader enterprise networks.
Affected Countries
Spain, France, Germany, Italy, Portugal, Belgium, Netherlands
CVE-2025-55343: n/a
Description
Quipux 4.0.1 through e1774ac allows authenticated users to conduct SQL injection attacks via busqueda/busqueda.php txt_depe_codi, busqueda/busqueda.php txt_usua_codi, anexos_lista.php radi_temp, Administracion/listas/formArea_ajax.php codDepe, Administracion/listas/formDepeHijo_ajax.php codDepe, Administracion/listas/formDepePadre_ajax.php codInst, asociar_documentos/asociar_borrar_referencia.php radi_nume, asociar_documentos/asociar_documento_buscar_query.php radi_nume, asociar_documentos/asociar_documento_grabar.php txt_radi_nume, asociar_documentos/asociar_documento radi_nume, radicacion/buscar_usuario.php buscar_tipo, radicacion/formArea_ajax.php codDepe, radicacion/formDepeHijo_ajax.php codDepe, radicacion/formDepePadre_ajax.php codInst, radicacion/ver_datos_usuario.php destinatorio, reportes/reporte_TraspasoDocFisico.php verrad, tx/datos_imprimir_sobre.php txt_usua_codi, tx/datos_imprimir_sobre.php nume_radi_temp, tx/revertir_firma_digital_grabar.php txt_radi_nume, tx/tx_borrar_opcion_imp.php codigo_opc, tx/tx_realizar_tx.php txt_radicados, tx/tx_seguridad_documentos.php txt_radicados, or uploadFiles/cargar_doc_digitalizado_paginador.php txt_depe_codi.
AI-Powered Analysis
Technical Analysis
CVE-2025-55343 is a critical SQL injection vulnerability identified in Quipux versions 4.0.1 through e1774ac. The flaw allows authenticated users to inject malicious SQL code through numerous input parameters across multiple PHP scripts, including busqueda.php, anexos_lista.php, various administrative AJAX forms, asociar_documentos scripts, radicacion scripts, reportes, and tx scripts. These parameters include txt_depe_codi, txt_usua_codi, radi_temp, codDepe, codInst, radi_nume, buscar_tipo, destinatorio, verrad, and others. The vulnerability stems from improper sanitization and validation of user-supplied input, leading to CWE-89 (SQL Injection) and CWE-74 (Improper Neutralization of Special Elements in Output). The CVSS 3.1 score of 9.9 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability with scope change. Exploiting this vulnerability could allow attackers to read, modify, or delete sensitive data, escalate privileges, or disrupt system operations. No patches or public exploits are currently available, increasing the urgency for proactive mitigation. The vulnerability affects core components of Quipux, a document and workflow management system widely used in government and enterprise environments, making it a high-value target for attackers.
Potential Impact
For European organizations, especially those in public administration, legal, or document-intensive sectors using Quipux, this vulnerability poses a severe risk. Exploitation could lead to unauthorized disclosure of sensitive documents, manipulation of official records, and disruption of critical workflows. This could result in regulatory non-compliance (e.g., GDPR violations), reputational damage, financial losses, and operational downtime. The ability for authenticated users to perform SQL injection attacks means insider threats or compromised credentials could be leveraged to cause significant harm. The broad range of affected scripts and parameters increases the attack surface, making detection and containment more challenging. Given the critical severity and potential for full database compromise, European entities must treat this vulnerability as a top priority to safeguard data integrity and availability.
Mitigation Recommendations
1. Immediately audit and restrict user privileges to the minimum necessary, limiting access to vulnerable functionalities. 2. Implement strict input validation and sanitization on all affected parameters, employing allowlists and rejecting unexpected input formats. 3. Refactor vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 4. Monitor logs for unusual database queries or errors indicative of injection attempts. 5. Deploy Web Application Firewalls (WAFs) with custom rules targeting the identified vulnerable endpoints and parameters. 6. Conduct thorough code reviews and security testing focusing on the affected PHP scripts. 7. If patches become available, prioritize their deployment in all environments. 8. Train developers and administrators on secure coding practices and the risks of SQL injection. 9. Prepare incident response plans to quickly address potential exploitation. 10. Consider network segmentation to isolate critical systems running Quipux from broader enterprise networks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-12T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690ba5a1976718a733ff315c
Added to database: 11/5/2025, 7:29:37 PM
Last enriched: 11/5/2025, 7:44:30 PM
Last updated: 11/6/2025, 5:39:54 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12563: CWE-862 Missing Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler
MediumCVE-2025-11271: CWE-807 Reliance on Untrusted Inputs in a Security Decision in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
MediumCVE-2025-61994: Cross-site scripting (XSS) in GROWI, Inc. GROWI
MediumCVE-2025-64480
UnknownCVE-2025-64479
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.