Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56450: n/a

0
Medium
VulnerabilityCVE-2025-56450cvecve-2025-56450
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Log2Space Subscriber Management Software 1.1 is vulnerable to unauthenticated SQL injection via the `lead_id` parameter in the `/l2s/api/selfcareLeadHistory` endpoint. A remote attacker can exploit this by sending a specially crafted POST request, resulting in the execution of arbitrary SQL queries. The backend fails to sanitize the user input, allowing enumeration of database schemas, table names, and potentially leading to full database compromise.

AI-Powered Analysis

AILast updated: 10/21/2025, 15:35:52 UTC

Technical Analysis

CVE-2025-56450 identifies a critical security vulnerability in Log2Space Subscriber Management Software version 1.1. The vulnerability is an unauthenticated SQL injection located in the lead_id parameter of the /l2s/api/selfcareLeadHistory API endpoint. This endpoint accepts POST requests but fails to properly sanitize or validate the lead_id input, allowing attackers to inject malicious SQL commands directly into the backend database queries. Exploiting this flaw, an attacker can enumerate database schemas and table names, potentially extracting sensitive subscriber data or manipulating the database contents. Since no authentication is required, any remote attacker with network access to the API can exploit this vulnerability without prior credentials or user interaction. The lack of a CVSS score indicates this is a newly published vulnerability (October 2025) with no known public exploits yet, but the technical details suggest a high risk due to the direct database compromise potential. The vulnerability affects a critical component of subscriber management software, which is often integral to telecom and service provider infrastructures. The absence of patch information underscores the need for immediate defensive measures. This vulnerability could lead to data breaches, unauthorized data manipulation, and service outages if exploited.

Potential Impact

For European organizations, particularly those in telecommunications, internet service provision, or any sector relying on Log2Space Subscriber Management Software, this vulnerability could lead to severe consequences. Confidential subscriber information, including personal and billing data, could be exposed or altered, resulting in privacy violations and regulatory non-compliance under GDPR. Integrity of subscriber records may be compromised, affecting billing accuracy and customer trust. Availability of subscriber management services could be disrupted if attackers manipulate or delete critical database entries. The reputational damage and potential financial penalties from data breaches could be substantial. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within affected organizations. The risk is amplified by the unauthenticated nature of the exploit, allowing attackers to operate without needing valid credentials.

Mitigation Recommendations

Organizations should immediately implement strict input validation and sanitization on the lead_id parameter to prevent SQL injection. Employ parameterized queries or prepared statements in the API backend to eliminate direct concatenation of user inputs into SQL commands. Conduct thorough code reviews and security testing on all API endpoints handling user-supplied data. Monitor network traffic for anomalous POST requests targeting /l2s/api/selfcareLeadHistory, especially those containing suspicious SQL syntax or patterns. Restrict API access using network segmentation and firewall rules to limit exposure to trusted sources only. If possible, deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts. Coordinate with Log2Space vendors or developers to obtain patches or updates addressing this vulnerability. Finally, ensure regular backups of subscriber databases are maintained to enable recovery in case of data corruption or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f7a4cea08cdec950718de7

Added to database: 10/21/2025, 3:20:46 PM

Last enriched: 10/21/2025, 3:35:52 PM

Last updated: 10/23/2025, 9:18:34 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats