CVE-2025-22954

10.0 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Koha library management software allows attackers to execute arbitrary SQL commands via the supplierid or serialid parameters in the lateissues-export.pl endpoint. All Koha installations before version 24.11.02 are affected, potentially compromising database integrity and confidentiality.

💻 Affected Systems

Products:
  • Koha
Versions: All versions before 24.11.02
Operating Systems: All platforms running Koha
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the serials module functionality; exploitation requires access to the lateissues-export.pl endpoint.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, modification, or deletion; potential privilege escalation to execute operating system commands via database functions.

🟠

Likely Case

Unauthorized data access and extraction from the Koha database, potentially exposing patron information, financial data, or administrative credentials.

🟢

If Mitigated

Limited impact with proper input validation and parameterized queries preventing SQL injection, though the vulnerability would still exist in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection via web parameters is a well-understood attack vector; exploitation would require access to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.11.02

Vendor Advisory: https://koha-community.org/koha-24-11-02-released/

Restart Required: No

Instructions:

1. Backup your Koha installation and database. 2. Update to Koha version 24.11.02 or later. 3. Verify the update completed successfully. 4. Test serials functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for supplierid and serialid parameters to only accept expected data formats

Access Restriction

all

Restrict access to /serials/lateissues-export.pl endpoint to authorized users only

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns targeting the vulnerable parameters
  • Disable or restrict the serials module functionality if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check Koha version; if earlier than 24.11.02, the system is vulnerable. Review C4/Serials.pm for the GetLateOrMissingIssues function.

Check Version:

koha-version

Verify Fix Applied:

Verify Koha version is 24.11.02 or later and test that SQL injection attempts on supplierid/serialid parameters are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed parameter validation attempts
  • Unexpected access to lateissues-export.pl

Network Indicators:

  • HTTP requests with SQL injection patterns in supplierid or serialid parameters
  • Unusual database connection patterns from web server

SIEM Query:

web.url:*lateissues-export.pl* AND (web.param:*supplierid* OR web.param:*serialid*) AND (web.param:*' OR * OR web.param:*;* OR web.param:*--*)

🔗 References

📤 Share & Export