CVE-2025-8220

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in Engeman Web allows attackers to execute arbitrary SQL commands via the LanguageCombobox cookie parameter on the password recovery page. Attackers can exploit this remotely to potentially access, modify, or delete database content. Organizations using Engeman Web up to version 12.0.0.2 are affected.

💻 Affected Systems

Products:
  • Engeman Web
Versions: Up to and including 12.0.0.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the password recovery feature enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, privilege escalation, or full system takeover.

🟠

Likely Case

Unauthorized data access, credential harvesting, or database manipulation leading to further attacks.

🟢

If Mitigated

Limited impact with proper input validation, WAF rules, and database permissions in place.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.0.0.3

Vendor Advisory: Not provided by vendor

Restart Required: Yes

Instructions:

1. Download Engeman Web version 12.0.0.3 or later. 2. Backup current installation and database. 3. Stop the Engeman Web service. 4. Install the updated version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

WAF Rule Implementation

all

Implement web application firewall rules to block SQL injection patterns in cookie parameters.

WAF-specific configuration required

Disable Password Recovery

all

Temporarily disable the password recovery functionality if not essential.

Application-specific configuration required

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all cookie parameters
  • Deploy network segmentation and restrict access to Engeman Web instances

🔍 How to Verify

Check if Vulnerable:

Check if Engeman Web version is 12.0.0.2 or earlier and has /Login/RecoveryPass endpoint accessible.

Check Version:

Check application version in admin interface or configuration files.

Verify Fix Applied:

Verify installation of version 12.0.0.3 or later and test that SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts from password recovery page
  • Suspicious cookie values containing SQL syntax

Network Indicators:

  • HTTP requests to /Login/RecoveryPass with SQL injection patterns in cookies
  • Unusual database connection patterns

SIEM Query:

source="engeman_web" AND (url="/Login/RecoveryPass" AND cookie="*SELECT*" OR cookie="*UNION*" OR cookie="*OR*1=1*")

🔗 References

📤 Share & Export