CVE-2022-31361

9.8 CRITICAL

📋 TL;DR

CVE-2022-31361 is a SQL injection vulnerability in Docebo Community Edition v4.0.5 and below that allows attackers to execute arbitrary SQL commands. This affects unsupported versions of the learning management system, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • Docebo Community Edition
Versions: v4.0.5 and below
Operating Systems: All platforms running affected Docebo versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects unsupported versions; maintainer no longer provides security updates for these versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access and extraction of sensitive information such as user credentials, personal data, and organizational information.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited; specific exploit details may not be publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available as product is unsupported. Upgrade to supported version or migrate to alternative platform.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side input validation to sanitize user inputs before SQL processing

Use Parameterized Queries

all

Modify application code to use prepared statements with parameterized queries

🧯 If You Can't Patch

  • Isolate affected systems from internet access and restrict to internal network only
  • Implement web application firewall (WAF) with SQL injection protection rules
  • Apply principle of least privilege to database user accounts
  • Enable detailed SQL query logging for anomaly detection

🔍 How to Verify

Check if Vulnerable:

Check Docebo version in admin panel or configuration files; if version is 4.0.5 or lower, system is vulnerable

Check Version:

Check Docebo configuration files or admin interface for version information

Verify Fix Applied:

Test SQL injection payloads against application endpoints; successful exploitation indicates vulnerability remains

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL-like patterns
  • Unexpected database query patterns

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.)
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND ("SELECT" OR "UNION" OR "' OR '1'='1") AND status=200

🔗 References

📤 Share & Export