Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69216: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager

0
High
VulnerabilityCVE-2025-69216cvecve-2025-69216cwe-89
Published: Fri Feb 06 2026 (02/06/2026, 18:10:33 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, an authenticated SQL injection vulnerability in OpenSTAManager's Scadenzario (Payment Schedule) print template allows any authenticated user to extract sensitive data from the database, including admin credentials, customer information, and financial records. The vulnerability exists in templates/scadenzario/init.php, where the id_anagrafica parameter is directly concatenated into an SQL query without proper sanitization. The vulnerability enables complete database read access through error-based SQL injection techniques.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:07:59 UTC

Technical Analysis

OpenSTAManager, an open source management software widely used for technical assistance and invoicing, contains a critical SQL injection vulnerability identified as CVE-2025-69216. The vulnerability exists in versions 2.9.8 and earlier within the Scadenzario (Payment Schedule) print template, specifically in the templates/scadenzario/init.php file. The root cause is the direct concatenation of the id_anagrafica parameter into an SQL query without proper sanitization or parameterization, violating secure coding practices and CWE-89 standards. This improper neutralization of special elements in SQL commands allows any authenticated user to perform error-based SQL injection attacks. Exploiting this vulnerability enables attackers to extract sensitive data from the backend database, including administrator credentials, customer information, and financial records, effectively compromising the confidentiality and integrity of the system. The CVSS 4.0 base score of 8.7 reflects the high severity, with an attack vector of network, low attack complexity, no user interaction, and privileges required limited to authentication. The vulnerability does not require additional user interaction beyond login, making it easier to exploit once credentials are obtained. While no public exploits are currently known, the potential impact is significant due to the sensitive nature of the data accessible. The vulnerability affects all deployments running vulnerable versions of OpenSTAManager, which are typically used by small to medium enterprises for managing technical assistance and invoicing workflows. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality and integrity of sensitive business data, including financial records and customer information. Exploitation could lead to data breaches, financial fraud, and unauthorized access to administrative functions, potentially disrupting business operations and damaging reputations. Given that OpenSTAManager is used primarily by SMEs for invoicing and technical support management, affected organizations may face regulatory compliance issues under GDPR due to exposure of personal and financial data. The availability of the system could also be indirectly impacted if attackers leverage the vulnerability to corrupt data or escalate privileges. The ease of exploitation by any authenticated user increases the threat level, especially in environments with weak access controls or shared credentials. European SMEs, which form a significant portion of the economy, may be particularly vulnerable if they rely on this software without timely remediation. Additionally, the exposure of administrative credentials could facilitate further lateral movement within corporate networks, amplifying the impact.

Mitigation Recommendations

Until an official patch is released, European organizations should implement the following specific mitigations: 1) Restrict access to the Scadenzario print template functionality to only trusted and necessary users, minimizing the attack surface. 2) Enforce strong authentication and session management policies to prevent unauthorized access. 3) Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the id_anagrafica parameter. 4) Conduct code reviews and apply manual input validation or parameterized queries in the affected PHP file if possible, to sanitize inputs before database queries. 5) Monitor database and application logs for unusual query patterns or error messages indicative of SQL injection attempts. 6) Educate users about the risks of credential sharing and enforce least privilege principles. 7) Plan for an immediate upgrade to a patched version once available, and test updates in a controlled environment before deployment. 8) Consider isolating the OpenSTAManager instance within a segmented network zone to limit potential lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T15:03:10.320Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863332f9fa50a62f2637a4

Added to database: 2/6/2026, 6:30:10 PM

Last enriched: 2/14/2026, 12:07:59 PM

Last updated: 3/22/2026, 11:20:48 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses