CVE-2025-65103: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.9.5, an authenticated SQL Injection vulnerability in the API allows any user, regardless of permission level, to execute arbitrary SQL queries. By manipulating the display parameter in an API request, an attacker can exfiltrate, modify, or delete any data in the database, leading to a full system compromise. This issue has been patched in version 2.9.5.
AI Analysis
Technical Summary
CVE-2025-65103 identifies an SQL Injection vulnerability classified under CWE-89 in the OpenSTAManager software developed by devcode-it. OpenSTAManager is an open-source management tool used for technical assistance and invoicing. The vulnerability exists in versions prior to 2.9.5 and is triggered via the API's 'display' parameter. Authenticated users, regardless of their permission level, can inject malicious SQL code through this parameter. This improper neutralization of special elements in SQL commands allows attackers to execute arbitrary SQL queries against the backend database. Potential consequences include unauthorized data disclosure, data manipulation, deletion, and ultimately full system compromise. The vulnerability is remotely exploitable over the network without user interaction but requires valid authentication credentials. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. The issue was publicly disclosed on November 19, 2025, and has been addressed in OpenSTAManager version 2.9.5. No public exploit code or active exploitation has been reported to date.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on OpenSTAManager for managing technical support and invoicing operations. Successful exploitation could lead to exposure of sensitive customer and financial data, manipulation or deletion of critical records, and disruption of business processes. This could result in regulatory non-compliance under GDPR due to data breaches, financial losses, reputational damage, and operational downtime. Since the vulnerability allows privilege escalation within the application context, even low-privileged users can cause severe damage. Organizations in sectors such as manufacturing, IT services, and SMEs using OpenSTAManager are particularly vulnerable. The impact extends beyond data loss to potential full system compromise, which could be leveraged for further lateral movement or ransomware attacks.
Mitigation Recommendations
European organizations should immediately upgrade OpenSTAManager to version 2.9.5 or later to apply the official patch. Until the update is applied, restrict API access to trusted users and networks only, employing network segmentation and strict access controls. Implement robust authentication mechanisms, including multi-factor authentication, to reduce the risk of credential misuse. Monitor API logs for unusual or suspicious 'display' parameter usage indicative of injection attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the API. Conduct regular security assessments and code reviews to identify similar injection flaws. Additionally, ensure database accounts used by the application have the least privileges necessary to limit the impact of potential exploitation. Finally, maintain up-to-date backups to enable recovery from data loss or corruption.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-65103: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
Description
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.9.5, an authenticated SQL Injection vulnerability in the API allows any user, regardless of permission level, to execute arbitrary SQL queries. By manipulating the display parameter in an API request, an attacker can exfiltrate, modify, or delete any data in the database, leading to a full system compromise. This issue has been patched in version 2.9.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-65103 identifies an SQL Injection vulnerability classified under CWE-89 in the OpenSTAManager software developed by devcode-it. OpenSTAManager is an open-source management tool used for technical assistance and invoicing. The vulnerability exists in versions prior to 2.9.5 and is triggered via the API's 'display' parameter. Authenticated users, regardless of their permission level, can inject malicious SQL code through this parameter. This improper neutralization of special elements in SQL commands allows attackers to execute arbitrary SQL queries against the backend database. Potential consequences include unauthorized data disclosure, data manipulation, deletion, and ultimately full system compromise. The vulnerability is remotely exploitable over the network without user interaction but requires valid authentication credentials. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. The issue was publicly disclosed on November 19, 2025, and has been addressed in OpenSTAManager version 2.9.5. No public exploit code or active exploitation has been reported to date.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on OpenSTAManager for managing technical support and invoicing operations. Successful exploitation could lead to exposure of sensitive customer and financial data, manipulation or deletion of critical records, and disruption of business processes. This could result in regulatory non-compliance under GDPR due to data breaches, financial losses, reputational damage, and operational downtime. Since the vulnerability allows privilege escalation within the application context, even low-privileged users can cause severe damage. Organizations in sectors such as manufacturing, IT services, and SMEs using OpenSTAManager are particularly vulnerable. The impact extends beyond data loss to potential full system compromise, which could be leveraged for further lateral movement or ransomware attacks.
Mitigation Recommendations
European organizations should immediately upgrade OpenSTAManager to version 2.9.5 or later to apply the official patch. Until the update is applied, restrict API access to trusted users and networks only, employing network segmentation and strict access controls. Implement robust authentication mechanisms, including multi-factor authentication, to reduce the risk of credential misuse. Monitor API logs for unusual or suspicious 'display' parameter usage indicative of injection attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the API. Conduct regular security assessments and code reviews to identify similar injection flaws. Additionally, ensure database accounts used by the application have the least privileges necessary to limit the impact of potential exploitation. Finally, maintain up-to-date backups to enable recovery from data loss or corruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.693Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691e18af49ba98bd8186a296
Added to database: 11/19/2025, 7:21:19 PM
Last enriched: 11/19/2025, 7:36:06 PM
Last updated: 11/19/2025, 8:45:07 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-58181: CWE-1284 in golang.org/x/crypto golang.org/x/crypto/ssh
HighCVE-2025-47914: CWE-237 in golang.org/x/crypto golang.org/x/crypto/ssh/agent
MediumCVE-2025-25036: CWE-611 Improper Restriction of XML External Entity Reference in Jalios JPlatform
MediumCVE-2025-25035: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Jalios JPlatform
HighCVE-2025-0364: CWE-288 Authentication Bypass Using an Alternate Path or Channel in BigAntSoft BigAnt Server
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.