CVE-2025-1751

9.8 CRITICAL

📋 TL;DR

A SQL injection vulnerability in Ciges 2.15.5 allows attackers to manipulate database operations through the $idServicio parameter in the /modules/ajaxBloqueaCita.php endpoint. This affects all systems running Ciges 2.15.5 from ATISoluciones, potentially compromising the entire database.

💻 Affected Systems

Products:
  • Ciges
Versions: 2.15.5
Operating Systems: All platforms running Ciges
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when the vulnerable endpoint is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, destruction, or ransomware deployment, potentially leading to full system takeover.

🟠

Likely Case

Unauthorized data access and manipulation of appointment/booking data, potentially exposing sensitive customer information.

🟢

If Mitigated

Limited impact with proper input validation and WAF rules blocking malicious SQL patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized quickly due to available tooling and low exploitation complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.atisoluciones.com/incidentes-cve

Restart Required: No

Instructions:

1. Check vendor advisory for patch availability. 2. If patch exists, download from vendor. 3. Apply patch following vendor instructions. 4. Test functionality.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and parameterized queries for the $idServicio parameter.

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns targeting the vulnerable endpoint.

🧯 If You Can't Patch

  • Block access to /modules/ajaxBloqueaCita.php endpoint at network perimeter
  • Implement strict input validation and use parameterized queries in application code

🔍 How to Verify

Check if Vulnerable:

Test the /modules/ajaxBloqueaCita.php endpoint with SQL injection payloads in the $idServicio parameter.

Check Version:

Check Ciges version in application interface or configuration files.

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that parameterized queries are implemented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed SQL injection attempts
  • Unexpected database operations

Network Indicators:

  • HTTP requests to /modules/ajaxBloqueaCita.php with SQL keywords in parameters
  • Unusual database traffic patterns

SIEM Query:

source="web_logs" AND uri="/modules/ajaxBloqueaCita.php" AND (param="idServicio" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR 1=1")

🔗 References

📤 Share & Export