Skip to main content

CVE-2025-8220: SQL Injection in Engeman Web

Medium
VulnerabilityCVE-2025-8220cvecve-2025-8220
Published: Sun Jul 27 2025 (07/27/2025, 03:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Engeman
Product: Web

Description

A vulnerability classified as critical has been found in Engeman Web up to 12.0.0.1. Affected is an unknown function of the file /Login/RecoveryPass of the component Password Recovery Page. The manipulation of the argument LanguageCombobox as part of Cookie leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/04/2025, 00:34:54 UTC

Technical Analysis

CVE-2025-8220 is a critical SQL Injection vulnerability identified in Engeman Web versions up to 12.0.0.1, specifically affecting the Password Recovery Page component located at /Login/RecoveryPass. The vulnerability arises from improper sanitization of the LanguageCombobox argument, which is passed as part of the HTTP Cookie header. An attacker can manipulate this cookie value to inject malicious SQL commands directly into the backend database query. This injection flaw allows remote exploitation without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability impacts confidentiality, integrity, and availability of the affected system by potentially allowing unauthorized data disclosure, data manipulation, or disruption of service. Although the vendor has been notified, there has been no response or patch released as of the publication date. The CVSS 4.0 base score is 6.9 (medium severity) due to partial impact on confidentiality, integrity, and availability, and the lack of authentication or user interaction required for exploitation. The exploit details have been publicly disclosed, increasing the risk of exploitation by threat actors. The absence of vendor remediation and the exposure of a critical web-facing component make this vulnerability a significant threat to organizations using Engeman Web for password recovery functionality.

Potential Impact

For European organizations using Engeman Web, this vulnerability poses a substantial risk. Successful exploitation could lead to unauthorized access to sensitive user credentials or personal data stored in the backend database, violating GDPR and other data protection regulations. Data integrity could be compromised by malicious modification or deletion of records, potentially disrupting business operations. Availability may also be affected if attackers leverage the injection to execute denial-of-service conditions or corrupt critical data. Given the remote and unauthenticated nature of the exploit, attackers can launch attacks at scale, increasing the likelihood of widespread impact. Organizations in sectors with high regulatory scrutiny such as finance, healthcare, and government are particularly vulnerable to reputational damage and legal consequences if exploited. The lack of vendor response and patches further exacerbates the risk, forcing organizations to rely on compensating controls until a fix is available.

Mitigation Recommendations

Immediate mitigation should focus on network-level and application-layer defenses. Organizations should implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the LanguageCombobox cookie parameter. Monitoring and logging of unusual cookie values and failed login or password recovery attempts should be enhanced to detect exploitation attempts early. Restricting access to the password recovery page to trusted IP ranges or via VPN can reduce exposure. Where possible, disable or temporarily restrict the password recovery functionality until a patch is available. Code-level mitigations include sanitizing and validating all cookie inputs rigorously, employing parameterized queries or prepared statements to prevent SQL injection, and conducting thorough security testing of the affected component. Organizations should also prepare incident response plans specific to SQL injection attacks and ensure backups are current and tested for recovery. Close monitoring of vendor communications for patches or updates is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T08:58:22.562Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68859dd9ad5a09ad006c8a5e

Added to database: 7/27/2025, 3:32:41 AM

Last enriched: 8/4/2025, 12:34:54 AM

Last updated: 9/14/2025, 12:42:40 PM

Views: 40

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats