Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65103: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager

0
High
VulnerabilityCVE-2025-65103cvecve-2025-65103cwe-89
Published: Wed Nov 19 2025 (11/19/2025, 19:09:09 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.9.5, an authenticated SQL Injection vulnerability in the API allows any user, regardless of permission level, to execute arbitrary SQL queries. By manipulating the display parameter in an API request, an attacker can exfiltrate, modify, or delete any data in the database, leading to a full system compromise. This issue has been patched in version 2.9.5.

AI-Powered Analysis

AILast updated: 11/19/2025, 19:36:06 UTC

Technical Analysis

CVE-2025-65103 identifies an SQL Injection vulnerability classified under CWE-89 in the OpenSTAManager software developed by devcode-it. OpenSTAManager is an open-source management tool used for technical assistance and invoicing. The vulnerability exists in versions prior to 2.9.5 and is triggered via the API's 'display' parameter. Authenticated users, regardless of their permission level, can inject malicious SQL code through this parameter. This improper neutralization of special elements in SQL commands allows attackers to execute arbitrary SQL queries against the backend database. Potential consequences include unauthorized data disclosure, data manipulation, deletion, and ultimately full system compromise. The vulnerability is remotely exploitable over the network without user interaction but requires valid authentication credentials. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required. The issue was publicly disclosed on November 19, 2025, and has been addressed in OpenSTAManager version 2.9.5. No public exploit code or active exploitation has been reported to date.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on OpenSTAManager for managing technical support and invoicing operations. Successful exploitation could lead to exposure of sensitive customer and financial data, manipulation or deletion of critical records, and disruption of business processes. This could result in regulatory non-compliance under GDPR due to data breaches, financial losses, reputational damage, and operational downtime. Since the vulnerability allows privilege escalation within the application context, even low-privileged users can cause severe damage. Organizations in sectors such as manufacturing, IT services, and SMEs using OpenSTAManager are particularly vulnerable. The impact extends beyond data loss to potential full system compromise, which could be leveraged for further lateral movement or ransomware attacks.

Mitigation Recommendations

European organizations should immediately upgrade OpenSTAManager to version 2.9.5 or later to apply the official patch. Until the update is applied, restrict API access to trusted users and networks only, employing network segmentation and strict access controls. Implement robust authentication mechanisms, including multi-factor authentication, to reduce the risk of credential misuse. Monitor API logs for unusual or suspicious 'display' parameter usage indicative of injection attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the API. Conduct regular security assessments and code reviews to identify similar injection flaws. Additionally, ensure database accounts used by the application have the least privileges necessary to limit the impact of potential exploitation. Finally, maintain up-to-date backups to enable recovery from data loss or corruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.693Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691e18af49ba98bd8186a296

Added to database: 11/19/2025, 7:21:19 PM

Last enriched: 11/19/2025, 7:36:06 PM

Last updated: 11/19/2025, 8:45:07 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats