CVE-2025-64092
This · This Multiple Products
A high-severity SQL Injection vulnerability has been identified in multiple products from the vendor "This".
Executive summary
A high-severity SQL Injection vulnerability has been identified in multiple products from the vendor "This". This flaw allows unauthenticated attackers to remotely manipulate the application's database, potentially leading to the theft, modification, or deletion of sensitive data without requiring any user credentials.
Vulnerability
The vulnerability exists due to improper sanitization of user-supplied input within GET request parameters. An unauthenticated remote attacker can craft a malicious URL containing specially formatted SQL commands. When the application processes this URL, the malicious SQL code is executed directly against the backend database, allowing the attacker to bypass authentication, exfiltrate sensitive information, modify or delete data, and in some configurations, potentially execute commands on the underlying operating system.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a significant data breach, compromising sensitive customer information, intellectual property, or financial records. The direct business impact includes potential financial loss, severe reputational damage, and regulatory penalties under data protection laws. Furthermore, compromising the database could disrupt business operations and serve as a pivot point for deeper intrusions into the corporate network.
Remediation
Immediate Action: Organizations must prioritize the deployment of security updates provided by the vendor across all affected systems. After patching, it is crucial to review web server and database access logs for any signs of exploitation that may have occurred prior to remediation.
Proactive Monitoring: Security teams should configure monitoring to detect and alert on suspicious web requests. Look for GET requests in web server logs containing SQL keywords (e.g., SELECT, UNION, INSERT, --, ' OR '1'='1'). Monitor database logs for unusual or unauthorized queries originating from the web application's service account.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to block SQL injection patterns. Enforce the principle of least privilege for the database user account connected to the application to limit the potential impact of a successful exploit.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.5) and the fact that this vulnerability can be exploited by an unauthenticated attacker remotely, immediate action is required. We strongly recommend that organizations identify all affected assets and apply the vendor-supplied patches without delay. While this vulnerability is not currently listed on the CISA KEV catalog, its characteristics make it a prime target for widespread exploitation. Deploying compensating controls such as a WAF should be considered a critical interim measure while the patching process is completed.