SQL Injection Vulnerability in ESAFENET CDG V5 Affects Remote Users
CVE-2025-0789
Key Information:
- Vendor
- Esafenet
- Status
- Cdg
- Vendor
- CVE Published:
- 28 January 2025
Badges
Summary
A security flaw has been identified in ESAFENET's CDG V5, specifically within the /doneDetail.jsp file. This vulnerability occurs due to improper handling of the flowId argument, allowing attackers to perform SQL injection attacks. Such exploits can be executed remotely, posing a significant risk to data integrity and confidentiality. Despite notifications to the vendor regarding this issue, no response has been recorded, raising concerns about the urgency of implementing necessary security measures.
Affected Version(s)
CDG V5
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published