Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58462: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in OPEXUS FOIAXpress Public Access Link (PAL)

0
Critical
VulnerabilityCVE-2025-58462cvecve-2025-58462cwe-89
Published: Tue Sep 09 2025 (09/09/2025, 21:09:48 UTC)
Source: CVE Database V5
Vendor/Project: OPEXUS
Product: FOIAXpress Public Access Link (PAL)

Description

OPEXUS FOIAXpress Public Access Link (PAL) before version 11.13.1.0 allows SQL injection via SearchPopularDocs.aspx. A remote, unauthenticated attacker could read, write, or delete any content in the underlying database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:53:45 UTC

Technical Analysis

CVE-2025-58462 identifies a critical SQL injection vulnerability in the OPEXUS FOIAXpress Public Access Link (PAL) product, specifically affecting versions before 11.13.1.0. The vulnerability resides in the SearchPopularDocs.aspx page, which fails to properly neutralize special characters in SQL commands, classified under CWE-89. This improper input validation allows an unauthenticated remote attacker to inject malicious SQL queries directly into the backend database. As a result, attackers can read sensitive data, modify records, or delete database content, potentially leading to full compromise of the data store. The vulnerability does not require any privileges or user interaction, making it trivially exploitable over the network. The CVSS v4.0 score of 9.3 reflects the high impact on confidentiality, integrity, and availability, combined with the low attack complexity and no required authentication. Although no public exploit code or active exploitation has been reported yet, the nature of SQL injection vulnerabilities and the critical access it grants make this a severe threat. The absence of a published patch at the time of disclosure increases the urgency for organizations to implement compensating controls or upgrade once available. FOIAXpress PAL is widely used in public records and information access systems, amplifying the potential impact on government transparency portals and public data repositories.

Potential Impact

The impact of CVE-2025-58462 is substantial for organizations using OPEXUS FOIAXpress PAL, particularly those managing sensitive public records or government information. Successful exploitation can lead to unauthorized disclosure of confidential information, data tampering, or complete deletion of critical database contents, undermining trust and operational continuity. This can result in regulatory non-compliance, reputational damage, and potential legal liabilities. The vulnerability's remote, unauthenticated nature means attackers can exploit it without insider access or user interaction, increasing the attack surface significantly. Public sector entities, legal offices, and organizations relying on FOIAXpress for transparency and information dissemination are especially vulnerable. The potential for data manipulation also raises concerns about misinformation or disruption of public services. Given the critical severity and ease of exploitation, widespread attacks could cause significant disruption and data breaches globally.

Mitigation Recommendations

Immediate mitigation should focus on upgrading FOIAXpress PAL to version 11.13.1.0 or later once available, as this will contain the official patch addressing the SQL injection flaw. Until a patch is deployed, organizations should implement strict input validation and sanitization at the web application firewall (WAF) or reverse proxy level to block malicious SQL payloads targeting SearchPopularDocs.aspx. Employing parameterized queries or prepared statements in custom integrations can reduce injection risks. Monitoring and logging all database queries and web requests to detect anomalous patterns indicative of SQL injection attempts is critical. Restricting database user permissions to the minimum necessary can limit damage if exploitation occurs. Additionally, isolating the FOIAXpress PAL server within segmented network zones and applying strict access controls can reduce exposure. Regular vulnerability scanning and penetration testing focused on SQL injection vectors should be conducted to verify mitigation effectiveness. Finally, organizations should prepare incident response plans for potential data breaches stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-09-02T21:00:53.965Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c09a1b9ed239a66bacd6e0

Added to database: 9/9/2025, 9:20:27 PM

Last enriched: 2/27/2026, 3:53:45 AM

Last updated: 3/24/2026, 11:45:55 PM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses