CVE-2026-33615

Unknown · Affected Software (setinfo endpoint)

An unauthenticated SQL injection vulnerability in the setinfo endpoint allows attackers to execute malicious SQL UPDATE commands, resulting in total loss of integrity and availability.

Executive summary

A critical SQL injection vulnerability in the setinfo endpoint allows unauthenticated remote attackers to manipulate database records, leading to potential data destruction and system failure.

Vulnerability

The vulnerability arises from improper neutralization of special elements within a SQL UPDATE command at the "setinfo" endpoint. An unauthenticated remote attacker can submit crafted input to execute arbitrary SQL queries against the backend database.

Business impact

A successful SQL injection attack can allow for the unauthorized modification or deletion of critical database records, leading to a total loss of data integrity. With a CVSS score of 9.1, this flaw could be used to disable user accounts, alter financial records, or render the entire application unavailable through database corruption.

Remediation

Immediate Action: Apply the latest security patches provided by the software vendor to implement proper input parameterization and sanitization for the setinfo endpoint.

Proactive Monitoring: Enable database activity monitoring to detect anomalous UPDATE patterns or syntax errors that indicate SQL injection attempts.

Compensating Controls: Deploy or update Web Application Firewall (WAF) signatures to detect and block common SQL injection patterns (e.g., ' OR 1=1) targeting the setinfo endpoint.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Due to the unauthenticated nature of this flaw and its high severity, it is imperative to apply the vendor's remediation immediately. Organizations should also conduct a broader review of their application code to ensure that all database interactions utilize prepared statements to prevent similar vulnerabilities.