Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-56699: n/a

0
Medium
VulnerabilityCVE-2025-56699cvecve-2025-56699
Published: Thu Oct 16 2025 (10/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL injection vulnerability in the cmd component of Base Digitale Group spa product Centrax Open PSIM version 6.1 allows an unauthenticated user to execute arbitrary SQL commands via the sender parameter.

AI-Powered Analysis

AILast updated: 10/16/2025, 17:14:12 UTC

Technical Analysis

CVE-2025-56699 is a critical SQL injection vulnerability identified in the cmd component of Centrax Open PSIM version 6.1, a product developed by Base Digitale Group spa. The vulnerability arises from improper sanitization of the 'sender' parameter, which can be manipulated by unauthenticated attackers to inject and execute arbitrary SQL commands against the backend database. This type of injection flaw can allow attackers to bypass authentication, extract sensitive data, modify or delete records, and potentially disrupt the availability of the PSIM system. The lack of authentication requirement significantly lowers the barrier to exploitation, increasing the threat level. Centrax Open PSIM is a Physical Security Information Management platform used to integrate and manage multiple security systems, making it a high-value target for attackers aiming to compromise physical security controls. Although no CVSS score or patches have been released as of the publication date, the vulnerability's nature and context suggest a critical security risk. No known exploits have been publicly reported yet, but the potential for exploitation remains high due to the straightforward attack vector. Organizations relying on this platform should urgently assess exposure and implement mitigations to prevent exploitation.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Compromise of Centrax Open PSIM could lead to unauthorized access to sensitive security data, manipulation of security events, and disruption of physical security operations. This could result in breaches of physical premises, loss of sensitive information, and operational downtime. Critical infrastructure sectors such as transportation, energy, government facilities, and large enterprises using PSIM solutions are particularly at risk. The ability for unauthenticated attackers to exploit this vulnerability increases the likelihood of attacks, potentially leading to widespread disruption. Additionally, regulatory compliance issues may arise if personal or sensitive data is exposed or if security controls are bypassed. The lack of a patch means organizations must rely on compensating controls, increasing operational complexity and risk.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and sanitization on all user-supplied parameters, especially the 'sender' parameter, to prevent injection attacks. 2) Restricting network access to the Centrax Open PSIM management interfaces to trusted IP addresses and using network segmentation to isolate the system from untrusted networks. 3) Deploying Web Application Firewalls (WAFs) or database activity monitoring tools to detect and block suspicious SQL queries. 4) Conducting thorough security audits and penetration tests focused on injection vulnerabilities within the PSIM environment. 5) Monitoring logs for unusual database queries or failed login attempts that may indicate exploitation attempts. 6) Preparing incident response plans specific to PSIM compromise scenarios. 7) Engaging with the vendor for timely updates and patches and planning for rapid deployment once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f124619f8a5dbaeaea87bf

Added to database: 10/16/2025, 4:59:13 PM

Last enriched: 10/16/2025, 5:14:12 PM

Last updated: 10/17/2025, 6:00:40 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats