CVE-2025-69216

6.5 MEDIUM

📋 TL;DR

OpenSTAManager versions 2.9.8 and earlier contain an authenticated SQL injection vulnerability in the Payment Schedule print template. Any authenticated user can exploit this to extract sensitive database information including admin credentials, customer data, and financial records. Organizations using affected versions are at risk of data breaches.

💻 Affected Systems

Products:
  • OpenSTAManager
Versions: 2.9.8 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but any authenticated user can exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to credential theft, financial fraud, customer data exfiltration, and potential lateral movement to other systems.

🟠

Likely Case

Authenticated attackers extracting sensitive customer information, financial records, and administrative credentials for further exploitation.

🟢

If Mitigated

Limited data exposure if proper network segmentation and database permissions are in place, but still significant risk from authenticated users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Error-based SQL injection with public advisory and proof-of-concept available. Requires authenticated access but exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.9 or later

Vendor Advisory: https://github.com/devcode-it/openstamanager/security/advisories/GHSA-q6g3-fv43-m2w6

Restart Required: Yes

Instructions:

1. Backup your OpenSTAManager installation and database. 2. Download version 2.9.9 or later from the official repository. 3. Replace the vulnerable files, particularly templates/scadenzario/init.php. 4. Restart the web server service. 5. Verify the fix by testing the Payment Schedule functionality.

🔧 Temporary Workarounds

Disable Payment Schedule Module

linux

Temporarily disable or restrict access to the vulnerable Payment Schedule print template

# Rename or remove the vulnerable file
mv templates/scadenzario/init.php templates/scadenzario/init.php.disabled

Implement Web Application Firewall Rules

all

Add SQL injection detection and blocking rules for the affected endpoint

# Example ModSecurity rule for the vulnerable parameter
SecRule ARGS:id_anagrafica "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQL Injection Attempt'"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenSTAManager from sensitive systems
  • Enforce principle of least privilege for database accounts and review all user permissions

🔍 How to Verify

Check if Vulnerable:

Check if templates/scadenzario/init.php contains unsanitized concatenation of id_anagrafica parameter into SQL queries. Test with SQL injection payloads in the Payment Schedule interface.

Check Version:

Check the version in the OpenSTAManager admin interface or review the software version files

Verify Fix Applied:

Verify that templates/scadenzario/init.php uses parameterized queries or proper input validation. Test that SQL injection attempts no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in web server logs
  • Multiple failed login attempts followed by Payment Schedule access
  • Unusual database query patterns from web application

Network Indicators:

  • SQL injection patterns in HTTP requests to /templates/scadenzario/ endpoints
  • Unusual database connection spikes from web server

SIEM Query:

source="web_server.log" AND ("SQL syntax" OR "You have an error in your SQL syntax" OR "id_anagrafica" AND (SELECT OR UNION))

🔗 References

📤 Share & Export