Skip to main content

CVE-2025-8161: SQL Injection in deerwms deer-wms-2

Medium
VulnerabilityCVE-2025-8161cvecve-2025-8161
Published: Fri Jul 25 2025 (07/25/2025, 16:32:12 UTC)
Source: CVE Database V5
Vendor/Project: deerwms
Product: deer-wms-2

Description

A vulnerability classified as critical was found in deerwms deer-wms-2 up to 3.3. Affected by this vulnerability is an unknown functionality of the file /system/role/export. The manipulation of the argument params[dataScope] leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/25/2025, 17:02:40 UTC

Technical Analysis

CVE-2025-8161 is a medium-severity SQL Injection vulnerability affecting deerwms deer-wms-2 versions 3.0 through 3.3. The vulnerability exists in an unspecified functionality within the /system/role/export endpoint, where the argument params[dataScope] is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, making it accessible to unauthenticated attackers over the network. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, indicating low privileges but not none), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not require special conditions such as scope change or security controls bypass. Although the CVSS score is 5.3 (medium), the presence of a publicly disclosed exploit increases the risk of exploitation. The vulnerability allows attackers to manipulate database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The lack of a patch link suggests that a fix may not yet be available, increasing the urgency for mitigation. The affected product, deer-wms-2, is a warehouse management system, which typically handles inventory, logistics, and supply chain data, making it a critical component in operational technology environments.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive inventory and logistics data, disruption of warehouse operations, and potential data integrity issues. This could result in financial losses, operational downtime, and damage to reputation. Given the critical role of warehouse management systems in supply chains, especially in manufacturing, retail, and distribution sectors prevalent across Europe, the impact could cascade to affect delivery schedules and customer satisfaction. Additionally, compromised data could expose business-sensitive information or personal data, raising compliance concerns under GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, particularly targeting organizations that have not yet updated or mitigated the vulnerability.

Mitigation Recommendations

Organizations using deer-wms-2 versions 3.0 to 3.3 should immediately audit their systems for exposure of the /system/role/export endpoint and restrict access to trusted networks via firewall rules or VPNs. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the params[dataScope] parameter. Monitor logs for unusual query patterns or repeated access attempts to this endpoint. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Conduct a thorough review of database permissions to limit the impact of potential injection attacks. Additionally, apply network segmentation to isolate warehouse management systems from broader corporate networks. Regularly update threat intelligence feeds and subscribe to vendor advisories for patch availability. Finally, perform penetration testing focused on injection vectors to validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-25T07:00:14.716Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6883b532ad5a09ad00533857

Added to database: 7/25/2025, 4:47:46 PM

Last enriched: 7/25/2025, 5:02:40 PM

Last updated: 7/26/2025, 12:34:14 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats