SQL Injection Vulnerability in ESAFENET CDG V5
CVE-2025-0786
Key Information:
- Vendor
- Esafenet
- Status
- Cdg
- Vendor
- CVE Published:
- 28 January 2025
Badges
Summary
A security flaw has been identified in ESAFENET CDG V5, specifically within the appDetail.jsp file. This vulnerability arises from improper handling of user input within the argument flowId, allowing attackers to execute SQL injection attacks remotely. If exploited, this could enable unauthorized access to the underlying database and potentially compromise sensitive information. The vulnerability has been publicly disclosed, prompting the need for immediate attention and remediation efforts from users and administrators of the affected product.
Affected Version(s)
CDG V5
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved