Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69216: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager

0
High
VulnerabilityCVE-2025-69216cvecve-2025-69216cwe-89
Published: Fri Feb 06 2026 (02/06/2026, 18:10:33 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

CVE-2025-69216 is a high-severity SQL injection vulnerability affecting OpenSTAManager versions 2. 9. 8 and earlier. It allows any authenticated user to exploit improper input sanitization in the Scadenzario print template, specifically via the id_anagrafica parameter. This flaw enables attackers to perform error-based SQL injection attacks, granting them read access to sensitive database contents such as admin credentials, customer data, and financial records. The vulnerability requires authentication but no user interaction beyond that. There are no known exploits in the wild yet, but the impact on confidentiality, integrity, and availability is high. European organizations using OpenSTAManager for technical assistance and invoicing are at risk, especially in countries with higher adoption of this software. Mitigation requires immediate patching once available, or applying strict input validation and query parameterization as a workaround. Monitoring and restricting authenticated user privileges can reduce exposure.

AI-Powered Analysis

AILast updated: 02/06/2026, 18:45:17 UTC

Technical Analysis

CVE-2025-69216 is an authenticated SQL injection vulnerability in OpenSTAManager, an open source management software used for technical assistance and invoicing. The vulnerability exists in versions 2.9.8 and earlier within the Scadenzario (Payment Schedule) print template, specifically in the templates/scadenzario/init.php file. The issue arises because the id_anagrafica parameter is directly concatenated into an SQL query without proper sanitization or use of prepared statements. This improper neutralization of special elements in SQL commands (CWE-89) allows an authenticated user to conduct error-based SQL injection attacks. Through this, an attacker can extract sensitive data from the backend database, including administrator credentials, customer personal information, and financial records, potentially compromising the entire system's confidentiality and integrity. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. Although no public exploits are currently known, the vulnerability poses a significant risk to organizations relying on OpenSTAManager for critical business functions.

Potential Impact

For European organizations, this vulnerability could lead to severe data breaches involving sensitive customer and financial information, undermining trust and potentially violating GDPR regulations. The exposure of admin credentials could allow attackers to escalate privileges and gain full control over the affected systems, leading to further data manipulation or service disruption. Since OpenSTAManager is used for invoicing and technical assistance, exploitation could disrupt billing processes and operational workflows, impacting business continuity. The breach of financial records may also result in financial fraud or compliance penalties. Organizations with limited security resources or those relying heavily on open source management tools without rigorous security controls are particularly vulnerable. The impact extends beyond data loss to reputational damage and legal consequences under European data protection laws.

Mitigation Recommendations

Immediate mitigation involves applying patches from the vendor once available. In the absence of official patches, organizations should implement strict input validation and sanitization on the id_anagrafica parameter, ideally replacing dynamic SQL queries with parameterized prepared statements to prevent injection. Restricting access rights so that only trusted users can authenticate and access the Scadenzario print template reduces the attack surface. Employing web application firewalls (WAFs) with SQL injection detection rules can help detect and block exploitation attempts. Regularly auditing database access logs for unusual queries and monitoring user activities can provide early warning signs of exploitation. Additionally, organizations should conduct security awareness training for users with access and ensure backups of critical data are maintained to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T15:03:10.320Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863332f9fa50a62f2637a4

Added to database: 2/6/2026, 6:30:10 PM

Last enriched: 2/6/2026, 6:45:17 PM

Last updated: 2/6/2026, 7:58:55 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats