CVE-2025-1809

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Pixsoft Sol allows attackers to execute arbitrary SQL commands via the txtUsuario parameter in the login endpoint. Successful exploitation could lead to authentication bypass, data theft, or complete system compromise. All users of Pixsoft Sol up to version 7.6.6c are affected.

💻 Affected Systems

Products:
  • Pixsoft Sol
Versions: Up to and including 7.6.6c
Operating Systems: All platforms running Pixsoft Sol
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the login endpoint specifically; all deployments with the vulnerable component are at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Authentication bypass allowing unauthorized access to the application, followed by data exfiltration and potential lateral movement within the system.

🟢

If Mitigated

Limited impact with proper input validation and WAF rules blocking SQL injection patterns, though risk remains if controls are bypassed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub, making this easily weaponizable by attackers with minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a version beyond 7.6.6c if available, or implement workarounds.

🔧 Temporary Workarounds

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns targeting the login endpoint.

# Example ModSecurity rule: SecRule ARGS:txtUsuario "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQLi attempt detected'"

Input Validation Filter

all

Implement server-side input validation to sanitize the txtUsuario parameter before processing.

# Example PHP: $usuario = mysqli_real_escape_string($conn, $_POST['txtUsuario']);

🧯 If You Can't Patch

  • Isolate the vulnerable system from the internet and restrict access to trusted networks only.
  • Implement strict network segmentation and monitor all traffic to/from the affected endpoint for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Test the login endpoint with SQL injection payloads in the txtUsuario parameter and observe if database errors or unexpected behavior occurs.

Check Version:

Check the application version in the admin interface or configuration files; specific command depends on deployment.

Verify Fix Applied:

After implementing workarounds, retest with SQL injection payloads to confirm they are blocked or sanitized properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax errors in application logs
  • Multiple failed login attempts with SQL-like patterns in username field
  • Successful logins from unexpected IP addresses

Network Indicators:

  • HTTP requests to /pix_projetos/servlet with SQL keywords in parameters
  • Unusual database query patterns from the application server

SIEM Query:

source="application.log" AND ("sql" OR "syntax" OR "union" OR "select") AND uri="/pix_projetos/servlet"

🔗 References

📤 Share & Export