Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8220: SQL Injection in Engeman Web

0
Medium
VulnerabilityCVE-2025-8220cvecve-2025-8220
Published: Sun Jul 27 2025 (07/27/2025, 03:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Engeman
Product: Web

Description

A vulnerability has been found in Engeman Web up to 12.0.0.2. The affected element is an unknown function of the file /Login/RecoveryPass of the component Password Recovery Page. The manipulation of the argument LanguageCombobox as part of Cookie leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 12.0.0.3 is sufficient to fix this issue. Upgrading the affected component is advised. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/12/2025, 03:34:25 UTC

Technical Analysis

CVE-2025-8220 identifies a SQL injection vulnerability in Engeman Web, a software product used for enterprise management, affecting versions 12.0.0.0 through 12.0.0.2. The vulnerability exists in the Password Recovery Page component, specifically within the /Login/RecoveryPass endpoint. Attackers can manipulate the LanguageCombobox parameter embedded in a cookie to inject malicious SQL queries. This occurs due to insufficient input validation and sanitization of this parameter before it is incorporated into SQL statements. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its threat potential. Successful exploitation could allow attackers to read, modify, or delete sensitive data stored in the backend database, potentially leading to data breaches, unauthorized access, or denial of service. The vendor has released version 12.0.0.3 which addresses this issue by properly sanitizing the input. Despite early notification, the vendor did not respond prior to public disclosure. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but public availability of the exploit details raises the risk of active attacks.

Potential Impact

For European organizations, this vulnerability poses significant risks including unauthorized data access, data manipulation, and potential service outages. Organizations handling sensitive personal data, financial records, or critical operational information stored in Engeman Web databases could face confidentiality breaches and integrity violations. This could lead to regulatory non-compliance under GDPR, reputational damage, and financial losses. The remote, unauthenticated nature of the exploit means attackers can target systems over the internet without needing insider access, increasing the attack surface. If exploited in critical infrastructure or government systems using Engeman Web, the impact could extend to operational disruptions. The medium severity rating suggests a serious but not catastrophic threat, emphasizing the need for timely patching and monitoring.

Mitigation Recommendations

European organizations should immediately upgrade Engeman Web installations to version 12.0.0.3 or later to remediate the vulnerability. Until patching is complete, implement web application firewalls (WAFs) with custom rules to detect and block suspicious cookie manipulations targeting the LanguageCombobox parameter. Conduct thorough input validation and sanitization audits on all user-supplied data, especially cookies, to prevent similar injection flaws. Monitor logs for unusual SQL errors or anomalous requests to the /Login/RecoveryPass endpoint. Restrict access to the password recovery functionality to trusted networks where feasible. Employ database activity monitoring to detect unauthorized queries. Engage in proactive vulnerability management and ensure vendor communication channels are monitored for updates. Finally, conduct security awareness training to recognize and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T08:58:22.562Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68859dd9ad5a09ad006c8a5e

Added to database: 7/27/2025, 3:32:41 AM

Last enriched: 10/12/2025, 3:34:25 AM

Last updated: 10/29/2025, 12:48:50 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats