CVE-2025-2118

7.3 HIGH

📋 TL;DR

This critical SQL injection vulnerability in Quantico Tecnologia PRMV 6.48 allows attackers to execute arbitrary SQL commands via the username parameter in the admin login endpoint. Attackers can remotely exploit this to bypass authentication, access sensitive data, or compromise the system. Organizations using PRMV 6.48 are affected.

💻 Affected Systems

Products:
  • Quantico Tecnologia PRMV
Versions: 6.48
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin login endpoint specifically; requires the application to be exposed and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including database takeover, credential theft, data exfiltration, and potential lateral movement to connected systems.

🟠

Likely Case

Authentication bypass leading to unauthorized admin access, sensitive data exposure, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation, WAF rules, and network segmentation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit disclosed publicly; SQL injection via username parameter requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check vendor website for security updates; apply patch if available; if no patch, implement workarounds immediately.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block SQL injection patterns targeting the /admin/login.php endpoint.

Input Validation Filter

all

Implement server-side input validation to sanitize username parameter before processing.

🧯 If You Can't Patch

  • Restrict network access to the admin login endpoint using firewall rules or network segmentation.
  • Implement strong authentication mechanisms and monitor for suspicious login attempts.

🔍 How to Verify

Check if Vulnerable:

Test the /admin/login.php endpoint with SQL injection payloads in the username parameter; monitor for SQL errors or unexpected responses.

Check Version:

Check application documentation or interface for version information; PRMV 6.48 is affected.

Verify Fix Applied:

Retest with SQL injection payloads after applying fixes; ensure no SQL errors or unauthorized access occurs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts with SQL-like patterns in username field
  • Successful admin logins from unexpected IP addresses

Network Indicators:

  • HTTP requests to /admin/login.php containing SQL keywords (e.g., UNION, SELECT, OR 1=1) in parameters

SIEM Query:

source="web_logs" AND uri="/admin/login.php" AND (username CONTAINS "UNION" OR username CONTAINS "SELECT" OR username CONTAINS "OR 1=1")

🔗 References

📤 Share & Export