CVE-2025-8220: SQL Injection in Engeman Web
A vulnerability has been found in Engeman Web up to 12.0.0.2. The affected element is an unknown function of the file /Login/RecoveryPass of the component Password Recovery Page. The manipulation of the argument LanguageCombobox as part of Cookie leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 12.0.0.3 is sufficient to fix this issue. Upgrading the affected component is advised. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-8220 identifies a SQL injection vulnerability in Engeman Web, a software product used for enterprise management, affecting versions 12.0.0.0 through 12.0.0.2. The vulnerability exists in the Password Recovery Page component, specifically within the /Login/RecoveryPass endpoint. Attackers can manipulate the LanguageCombobox parameter embedded in a cookie to inject malicious SQL queries. This occurs due to insufficient input validation and sanitization of this parameter before it is incorporated into SQL statements. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its threat potential. Successful exploitation could allow attackers to read, modify, or delete sensitive data stored in the backend database, potentially leading to data breaches, unauthorized access, or denial of service. The vendor has released version 12.0.0.3 which addresses this issue by properly sanitizing the input. Despite early notification, the vendor did not respond prior to public disclosure. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but public availability of the exploit details raises the risk of active attacks.
Potential Impact
For European organizations, this vulnerability poses significant risks including unauthorized data access, data manipulation, and potential service outages. Organizations handling sensitive personal data, financial records, or critical operational information stored in Engeman Web databases could face confidentiality breaches and integrity violations. This could lead to regulatory non-compliance under GDPR, reputational damage, and financial losses. The remote, unauthenticated nature of the exploit means attackers can target systems over the internet without needing insider access, increasing the attack surface. If exploited in critical infrastructure or government systems using Engeman Web, the impact could extend to operational disruptions. The medium severity rating suggests a serious but not catastrophic threat, emphasizing the need for timely patching and monitoring.
Mitigation Recommendations
European organizations should immediately upgrade Engeman Web installations to version 12.0.0.3 or later to remediate the vulnerability. Until patching is complete, implement web application firewalls (WAFs) with custom rules to detect and block suspicious cookie manipulations targeting the LanguageCombobox parameter. Conduct thorough input validation and sanitization audits on all user-supplied data, especially cookies, to prevent similar injection flaws. Monitor logs for unusual SQL errors or anomalous requests to the /Login/RecoveryPass endpoint. Restrict access to the password recovery functionality to trusted networks where feasible. Employ database activity monitoring to detect unauthorized queries. Engage in proactive vulnerability management and ensure vendor communication channels are monitored for updates. Finally, conduct security awareness training to recognize and respond to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-8220: SQL Injection in Engeman Web
Description
A vulnerability has been found in Engeman Web up to 12.0.0.2. The affected element is an unknown function of the file /Login/RecoveryPass of the component Password Recovery Page. The manipulation of the argument LanguageCombobox as part of Cookie leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 12.0.0.3 is sufficient to fix this issue. Upgrading the affected component is advised. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-8220 identifies a SQL injection vulnerability in Engeman Web, a software product used for enterprise management, affecting versions 12.0.0.0 through 12.0.0.2. The vulnerability exists in the Password Recovery Page component, specifically within the /Login/RecoveryPass endpoint. Attackers can manipulate the LanguageCombobox parameter embedded in a cookie to inject malicious SQL queries. This occurs due to insufficient input validation and sanitization of this parameter before it is incorporated into SQL statements. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its threat potential. Successful exploitation could allow attackers to read, modify, or delete sensitive data stored in the backend database, potentially leading to data breaches, unauthorized access, or denial of service. The vendor has released version 12.0.0.3 which addresses this issue by properly sanitizing the input. Despite early notification, the vendor did not respond prior to public disclosure. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild yet, but public availability of the exploit details raises the risk of active attacks.
Potential Impact
For European organizations, this vulnerability poses significant risks including unauthorized data access, data manipulation, and potential service outages. Organizations handling sensitive personal data, financial records, or critical operational information stored in Engeman Web databases could face confidentiality breaches and integrity violations. This could lead to regulatory non-compliance under GDPR, reputational damage, and financial losses. The remote, unauthenticated nature of the exploit means attackers can target systems over the internet without needing insider access, increasing the attack surface. If exploited in critical infrastructure or government systems using Engeman Web, the impact could extend to operational disruptions. The medium severity rating suggests a serious but not catastrophic threat, emphasizing the need for timely patching and monitoring.
Mitigation Recommendations
European organizations should immediately upgrade Engeman Web installations to version 12.0.0.3 or later to remediate the vulnerability. Until patching is complete, implement web application firewalls (WAFs) with custom rules to detect and block suspicious cookie manipulations targeting the LanguageCombobox parameter. Conduct thorough input validation and sanitization audits on all user-supplied data, especially cookies, to prevent similar injection flaws. Monitor logs for unusual SQL errors or anomalous requests to the /Login/RecoveryPass endpoint. Restrict access to the password recovery functionality to trusted networks where feasible. Employ database activity monitoring to detect unauthorized queries. Engage in proactive vulnerability management and ensure vendor communication channels are monitored for updates. Finally, conduct security awareness training to recognize and respond to potential exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-26T08:58:22.562Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68859dd9ad5a09ad006c8a5e
Added to database: 7/27/2025, 3:32:41 AM
Last enriched: 10/12/2025, 3:34:25 AM
Last updated: 10/29/2025, 12:48:50 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Inside the Data on Insider Threats: What 1,000 Real Cases Reveal About Hidden Risk
MediumCVE-2024-54677: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache Tomcat
MediumCVE-2024-52316: CWE-391 Unchecked Error Condition in Apache Software Foundation Apache Tomcat
CriticalCVE-2024-50379: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in Apache Software Foundation Apache Tomcat
CriticalCVE-2023-39178
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.