CVE-2025-6791

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in Centreon web's monitoring event logs module allows attackers to manipulate HTTP requests to inject malicious SQL payloads into the database. It affects all Centreon web versions 23.10.0, 24.04.0, and 24.10.0. Organizations using these versions for IT infrastructure monitoring are at risk.

💻 Affected Systems

Products:
  • Centreon Web
Versions: 23.10.0, 24.04.0, 24.10.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the monitoring event logs module specifically. All installations with these versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized database access, data exfiltration of monitoring information, and potential system compromise.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, though SQL injection attempts would still be logged.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity. Authentication is required to access the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest releases on GitHub for patched versions

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-6791-centreon-web-all-versions-high-severity-4900

Restart Required: Yes

Instructions:

1. Backup your Centreon installation and database. 2. Update to the latest patched version from the official GitHub releases. 3. Restart Centreon services. 4. Verify the fix by testing the monitoring event logs functionality.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for the monitoring event logs endpoint parameters

Not applicable - requires code modification

Web Application Firewall Rules

all

Deploy WAF rules to block SQL injection patterns targeting the event logs endpoint

WAF-specific configuration commands

🧯 If You Can't Patch

  • Restrict network access to Centreon web interface to trusted IP addresses only
  • Implement database-level controls: use least privilege accounts, enable query logging, and review database permissions

🔍 How to Verify

Check if Vulnerable:

Check Centreon web version via web interface or configuration files. If running 23.10.0, 24.04.0, or 24.10.0, you are vulnerable.

Check Version:

grep 'version' /etc/centreon/centreon.conf.php or check via Centreon web interface

Verify Fix Applied:

After patching, test the monitoring event logs functionality and verify no SQL errors occur with various inputs. Check that version number has been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts followed by event log access
  • HTTP requests with SQL keywords to event logs endpoint

Network Indicators:

  • Unusual database connection patterns from web server
  • HTTP POST requests containing SQL syntax to event logs API

SIEM Query:

source="centreon_web" AND (url="*event*log*" AND (param="*SELECT*" OR param="*UNION*" OR param="*OR*"))

🔗 References

📤 Share & Export