Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55703: n/a

0
Low
VulnerabilityCVE-2025-55703cvecve-2025-55703
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-55703 is an error-based SQL injection vulnerability in the Sunbird Power IQ 9. 2. 0 API caused by improper input validation on an outdated API endpoint. This flaw allows attackers with low privileges and requiring user interaction to manipulate SQL queries, potentially exposing limited confidential data. The vulnerability has a low CVSS score of 2. 5 due to high attack complexity, limited impact on confidentiality, and the need for authentication and user interaction. It was fixed in version 9. 2. 1 by updating the API call code to safely handle input arrays. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 12/22/2025, 20:40:49 UTC

Technical Analysis

CVE-2025-55703 identifies an error-based SQL injection vulnerability in the Sunbird Power IQ 9.2.0 API. The root cause is an outdated API endpoint that improperly processes input arrays without adequate validation, enabling attackers to inject malicious SQL code. This vulnerability falls under CWE-89, indicating classic SQL injection issues. Exploitation requires low privileges and user interaction, with a high attack complexity, limiting the ease of exploitation. The vulnerability affects the confidentiality of data to a limited extent, with no direct impact on integrity or availability. The scope is confined to systems running the vulnerable API version. The issue was addressed in Power IQ 9.2.1 by revising the API call implementation to ensure safe input handling, effectively mitigating the injection risk. No public exploits or active exploitation campaigns have been reported, suggesting limited current threat activity. However, the presence of this vulnerability in critical monitoring and management software like Power IQ could pose risks if left unpatched, especially in environments where API access is exposed or insufficiently controlled.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential exposure of limited confidential information through manipulated SQL queries. Although the CVSS score is low, organizations using Sunbird Power IQ 9.2.0 in critical infrastructure or data center environments could face increased risk if attackers gain access to the vulnerable API endpoint. The requirement for authentication and user interaction reduces the likelihood of widespread exploitation but does not eliminate targeted attacks. Compromise could lead to unauthorized data disclosure, which may violate data protection regulations such as GDPR. Additionally, attackers might leverage this vulnerability as a foothold for further attacks if combined with other weaknesses. The limited impact on integrity and availability means operational disruption is unlikely, but confidentiality breaches remain a concern. Organizations relying on Power IQ for energy or data center management should assess their exposure and prioritize remediation to maintain compliance and security posture.

Mitigation Recommendations

European organizations should immediately upgrade Sunbird Power IQ installations from version 9.2.0 to 9.2.1 or later to apply the official fix. In addition, they should audit and restrict API access to trusted users and systems, implementing strict authentication and authorization controls. Employing Web Application Firewalls (WAFs) with SQL injection detection rules can provide an additional defensive layer. Regularly review API logs for unusual or suspicious activity indicative of injection attempts. Conduct security training to ensure users understand the risks of interacting with untrusted inputs. Network segmentation should be applied to isolate management interfaces from general user networks. Finally, integrate vulnerability scanning and penetration testing focused on API endpoints to proactively identify and remediate similar issues before exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694068d4d9bcdf3f3dfeb541

Added to database: 12/15/2025, 8:00:20 PM

Last enriched: 12/22/2025, 8:40:49 PM

Last updated: 2/6/2026, 12:22:37 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats