Skip to main content

CVE-2025-8220: SQL Injection in Engeman Web

Medium
VulnerabilityCVE-2025-8220cvecve-2025-8220
Published: Sun Jul 27 2025 (07/27/2025, 03:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Engeman
Product: Web

Description

A vulnerability classified as critical has been found in Engeman Web up to 12.0.0.1. Affected is an unknown function of the file /Login/RecoveryPass of the component Password Recovery Page. The manipulation of the argument LanguageCombobox leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/27/2025, 03:47:39 UTC

Technical Analysis

CVE-2025-8220 is a SQL Injection vulnerability identified in Engeman Web versions up to 12.0.0.1, specifically affecting the Password Recovery Page component located at /Login/RecoveryPass. The vulnerability arises from improper sanitization of the 'LanguageCombobox' argument, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has been publicly disclosed, and while no known exploits are currently observed in the wild, the availability of the exploit code increases the risk of exploitation. The vendor has been notified but has not responded or provided a patch, leaving affected systems exposed. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with attack vector being network-based, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or potentially escalate further attacks depending on the database privileges of the web application.

Potential Impact

For European organizations using Engeman Web versions 12.0.0.0 or 12.0.0.1, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive information managed through the platform, particularly user credentials and password recovery data. Exploitation could lead to unauthorized access to internal systems, data breaches involving personal or corporate information, and disruption of service availability. Given the lack of vendor response and patches, organizations face increased exposure time. The risk is heightened for sectors with stringent data protection requirements under GDPR, as data leakage could result in regulatory penalties and reputational damage. Additionally, attackers could leverage this vulnerability as an initial foothold for lateral movement within networks, potentially impacting broader IT infrastructure.

Mitigation Recommendations

Immediate mitigation steps include implementing web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'LanguageCombobox' parameter on the /Login/RecoveryPass endpoint. Organizations should conduct thorough input validation and sanitization on all user-supplied data, especially parameters involved in authentication and password recovery workflows. Network segmentation and strict access controls should be enforced to limit database exposure. Monitoring and logging of unusual database queries and web requests can help detect exploitation attempts early. If possible, temporarily disabling or restricting access to the vulnerable password recovery functionality until a vendor patch or workaround is available is advisable. Organizations should also engage with Engeman for updates and consider alternative solutions if remediation is delayed. Regular security assessments and penetration testing focusing on injection flaws are recommended to identify similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T08:58:22.562Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68859dd9ad5a09ad006c8a5e

Added to database: 7/27/2025, 3:32:41 AM

Last enriched: 7/27/2025, 3:47:39 AM

Last updated: 7/31/2025, 12:34:33 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats