CVE-2025-6277: SQL Injection in Brilliance Golden Link Secondary System
A vulnerability classified as critical has been found in Brilliance Golden Link Secondary System up to 20250609. This affects an unknown part of the file /storagework/custTakeInfoPage.htm. The manipulation of the argument custTradeName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-6277 is a SQL Injection vulnerability identified in the Brilliance Golden Link Secondary System, specifically affecting versions up to 20250609. The vulnerability exists in the handling of the 'custTradeName' parameter within the file /storagework/custTakeInfoPage.htm. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially compromising the backend database. The vulnerability does not require user interaction or authentication, making it accessible to unauthenticated remote attackers. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that while the attack vector is network-based and requires no user interaction, it does require low privileges (PR:L) and results in low impact on confidentiality, integrity, and availability. The vulnerability is exploitable remotely, but no known exploits are currently reported in the wild. The lack of patch links suggests that a fix may not yet be publicly available or disclosed. The vulnerability could allow attackers to read or modify limited data within the database, potentially leading to unauthorized data access or manipulation, but the scope and scale of impact are limited by the low confidentiality, integrity, and availability impacts indicated in the CVSS vector.
Potential Impact
For European organizations using the Brilliance Golden Link Secondary System, this vulnerability poses a moderate risk. SQL injection can lead to unauthorized data access or modification, which may compromise sensitive customer or business data. Given the medium severity and low impact ratings, the threat is unlikely to cause widespread system outages or critical data breaches but could still result in data integrity issues or partial data disclosure. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or critical infrastructure, may face compliance risks if exploited. The remote and unauthenticated nature of the vulnerability increases the risk of exploitation, especially if the system is exposed to the internet or poorly segmented within internal networks. However, the requirement for low privileges suggests some form of authentication or limited access is needed, which may reduce the attack surface if proper access controls are in place.
Mitigation Recommendations
Implement strict input validation and parameterized queries or prepared statements for the 'custTradeName' parameter to prevent SQL injection. Restrict network access to the Brilliance Golden Link Secondary System, ensuring it is not directly exposed to untrusted networks or the internet. Apply network segmentation and firewall rules to limit access to the vulnerable system only to authorized users and systems. Monitor logs for unusual or suspicious SQL queries or access patterns related to the custTakeInfoPage.htm endpoint. If available, apply vendor patches or updates promptly once released; in the absence of patches, consider temporary workarounds such as web application firewalls (WAF) with custom rules to block malicious SQL injection payloads targeting the custTradeName parameter. Conduct regular security assessments and penetration testing focused on injection vulnerabilities in the affected system. Enforce the principle of least privilege for accounts accessing the system to minimize potential damage from exploitation.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-6277: SQL Injection in Brilliance Golden Link Secondary System
Description
A vulnerability classified as critical has been found in Brilliance Golden Link Secondary System up to 20250609. This affects an unknown part of the file /storagework/custTakeInfoPage.htm. The manipulation of the argument custTradeName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-6277 is a SQL Injection vulnerability identified in the Brilliance Golden Link Secondary System, specifically affecting versions up to 20250609. The vulnerability exists in the handling of the 'custTradeName' parameter within the file /storagework/custTakeInfoPage.htm. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially compromising the backend database. The vulnerability does not require user interaction or authentication, making it accessible to unauthenticated remote attackers. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that while the attack vector is network-based and requires no user interaction, it does require low privileges (PR:L) and results in low impact on confidentiality, integrity, and availability. The vulnerability is exploitable remotely, but no known exploits are currently reported in the wild. The lack of patch links suggests that a fix may not yet be publicly available or disclosed. The vulnerability could allow attackers to read or modify limited data within the database, potentially leading to unauthorized data access or manipulation, but the scope and scale of impact are limited by the low confidentiality, integrity, and availability impacts indicated in the CVSS vector.
Potential Impact
For European organizations using the Brilliance Golden Link Secondary System, this vulnerability poses a moderate risk. SQL injection can lead to unauthorized data access or modification, which may compromise sensitive customer or business data. Given the medium severity and low impact ratings, the threat is unlikely to cause widespread system outages or critical data breaches but could still result in data integrity issues or partial data disclosure. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or critical infrastructure, may face compliance risks if exploited. The remote and unauthenticated nature of the vulnerability increases the risk of exploitation, especially if the system is exposed to the internet or poorly segmented within internal networks. However, the requirement for low privileges suggests some form of authentication or limited access is needed, which may reduce the attack surface if proper access controls are in place.
Mitigation Recommendations
Implement strict input validation and parameterized queries or prepared statements for the 'custTradeName' parameter to prevent SQL injection. Restrict network access to the Brilliance Golden Link Secondary System, ensuring it is not directly exposed to untrusted networks or the internet. Apply network segmentation and firewall rules to limit access to the vulnerable system only to authorized users and systems. Monitor logs for unusual or suspicious SQL queries or access patterns related to the custTakeInfoPage.htm endpoint. If available, apply vendor patches or updates promptly once released; in the absence of patches, consider temporary workarounds such as web application firewalls (WAF) with custom rules to block malicious SQL injection payloads targeting the custTradeName parameter. Conduct regular security assessments and penetration testing focused on injection vulnerabilities in the affected system. Enforce the principle of least privilege for accounts accessing the system to minimize potential damage from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-19T06:48:24.083Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6859ad500112634db704105b
Added to database: 6/23/2025, 7:38:56 PM
Last enriched: 6/23/2025, 7:41:17 PM
Last updated: 8/3/2025, 10:39:34 PM
Views: 12
Related Threats
CVE-2025-2713: CWE-269 Improper Privilege Management in Google gVisor
MediumCVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-8914: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WellChoose Organization Portal System
HighCVE-2025-8913: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WellChoose Organization Portal System
CriticalCVE-2025-8912: CWE-36 Absolute Path Traversal in WellChoose Organization Portal System
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.