Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6791: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Centreon web

0
High
VulnerabilityCVE-2025-6791cvecve-2025-6791cwe-89
Published: Fri Aug 22 2025 (08/22/2025, 18:56:28 UTC)
Source: CVE Database V5
Vendor/Project: Centreon
Product: web

Description

In the monitoring event logs page, it is possible to alter the http request to insert a reflect payload in the DB. Caused by an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Centreon web (Monitoring event logs modules) allows SQL Injection.This issue affects web: 24.10.0, 24.04.0, 23.10.0.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:11:43 UTC

Technical Analysis

CVE-2025-6791 is a high-severity SQL Injection vulnerability (CWE-89) affecting the Centreon web application, specifically within the monitoring event logs module. Centreon is a widely used IT infrastructure monitoring solution that provides real-time visibility into network and system health. The vulnerability exists in versions 23.10.0, 24.04.0, and 24.10.0 of the Centreon web interface. It arises due to improper neutralization of special elements in SQL commands, allowing an attacker to manipulate HTTP requests to inject malicious SQL payloads. This flaw enables unauthorized alteration of database queries, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 3.1 base score is 8.8, indicating a high severity with network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are reported in the wild yet, the vulnerability's nature and severity make it a critical concern. Exploitation requires some level of privileges but no user interaction, meaning an authenticated user with limited rights could escalate their privileges or compromise the system. The vulnerability could allow attackers to extract sensitive monitoring data, manipulate event logs, or disrupt monitoring services, which are critical for operational security and incident response. Given Centreon's role in monitoring IT infrastructure, exploitation could have cascading effects on organizational security posture and operational continuity.

Potential Impact

For European organizations, the impact of CVE-2025-6791 could be significant. Centreon is commonly deployed in enterprise environments, including government agencies, telecommunications, finance, and critical infrastructure sectors across Europe. Successful exploitation could lead to unauthorized access to sensitive monitoring data, including logs that track system health and security events, undermining trust in monitoring systems. Attackers could alter or delete event logs, hindering incident detection and response capabilities. The compromise of monitoring infrastructure could also enable further lateral movement within networks, increasing the risk of broader breaches. Disruption of monitoring services could affect availability and operational continuity, especially in sectors reliant on real-time monitoring for compliance and service level agreements. The requirement for some privileges to exploit the vulnerability means insider threats or compromised user accounts pose a higher risk. Additionally, given the high confidentiality and integrity impact, organizations could face regulatory and reputational consequences under GDPR and other European data protection frameworks if sensitive data is exposed or manipulated.

Mitigation Recommendations

1. Immediate patching: Although no patch links are provided in the source, organizations should monitor Centreon's official channels for security updates and apply patches as soon as they become available. 2. Access control hardening: Restrict access to the Centreon web interface to trusted users only, using network segmentation, VPNs, or IP whitelisting to limit exposure. 3. Privilege minimization: Review and enforce the principle of least privilege for all Centreon users, ensuring that only necessary privileges are granted to reduce the risk of exploitation. 4. Input validation and sanitization: Implement additional web application firewalls (WAF) or intrusion prevention systems (IPS) that can detect and block SQL injection attempts targeting the monitoring event logs page. 5. Monitoring and alerting: Enhance logging and monitoring of Centreon web access, focusing on unusual or malformed HTTP requests that could indicate exploitation attempts. 6. Incident response readiness: Prepare for potential exploitation by establishing procedures to quickly isolate affected systems, analyze logs, and restore integrity of monitoring data. 7. Vendor engagement: Engage with Centreon support for guidance and to confirm patch availability or workarounds. 8. Network segmentation: Isolate monitoring infrastructure from general user networks to reduce the attack surface and limit lateral movement opportunities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Centreon
Date Reserved
2025-06-27T14:34:22.260Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a8bed7ad5a09ad0021645d

Added to database: 8/22/2025, 7:02:47 PM

Last enriched: 9/17/2025, 12:11:43 AM

Last updated: 10/7/2025, 1:50:01 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats