CVE-2025-67280

5.4 MEDIUM

📋 TL;DR

Multiple Hibernate Query Language injection vulnerabilities in TIM BPM Suite/TIM FLOW allow low-privileged authenticated users to extract other users' passwords and access sensitive data. This affects organizations using these workflow automation platforms up to version 9.1.2.

💻 Affected Systems

Products:
  • TIM BPM Suite
  • TIM FLOW
Versions: through 9.1.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated low-privileged user access. All deployments using vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract all user credentials, gain administrative access, and compromise the entire TIM platform and connected systems.

🟠

Likely Case

Low-privileged users could access sensitive data of other users, potentially including passwords, leading to privilege escalation and data breaches.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to the TIM application with no lateral movement to other systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses standard HQL injection techniques. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.1.3 or later

Vendor Advisory: https://tim-doc.atlassian.net/wiki/spaces/eng/pages/230981636/Release+Notes

Restart Required: Yes

Instructions:

1. Download TIM BPM Suite/TIM FLOW version 9.1.3 or later from official vendor sources. 2. Backup current installation and data. 3. Apply the update following vendor documentation. 4. Restart all TIM services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to TIM applications to only authorized users and networks

Principle of Least Privilege

all

Review and minimize user privileges to reduce attack surface

🧯 If You Can't Patch

  • Implement strict network access controls to limit TIM application access
  • Enable detailed logging and monitoring for suspicious HQL queries and data access patterns

🔍 How to Verify

Check if Vulnerable:

Check TIM application version in admin interface or configuration files. Versions 9.1.2 and earlier are vulnerable.

Check Version:

Check TIM admin console or configuration files for version information

Verify Fix Applied:

Verify version is 9.1.3 or later in admin interface and test user data access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HQL query patterns
  • Multiple failed authentication attempts followed by successful login
  • User accessing data outside their normal scope

Network Indicators:

  • Unusual database query patterns from TIM application servers
  • Multiple data extraction requests from single user sessions

SIEM Query:

source="tim_app" AND (query="*password*" OR query="*user*" OR query="*select* from*")

🔗 References

📤 Share & Export