CVE-2026-25947

8.8 HIGH

📋 TL;DR

CVE-2026-25947 is a SQL injection vulnerability in Worklenz project management software that allows attackers to execute arbitrary SQL commands through multiple backend endpoints. This affects all Worklenz users running versions prior to 2.1.7, potentially exposing sensitive project, financial, and user data.

💻 Affected Systems

Products:
  • Worklenz
Versions: All versions prior to 2.1.7
Operating Systems: All platforms running Worklenz
Default Config Vulnerable: ⚠️ Yes
Notes: Affects project/task management, reporting, financial data, real-time handlers, and resource allocation features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, authentication bypass, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized access to sensitive project data, financial information, and user credentials stored in the database.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.

🌐 Internet-Facing: HIGH - The affected endpoints include real-time socket.io handlers and reporting APIs that are typically exposed to users.
🏢 Internal Only: MEDIUM - While some endpoints may be internal, SQL injection can still lead to lateral movement within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, but specific exploit details are not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.1.7

Vendor Advisory: https://github.com/Worklenz/worklenz/security/advisories/GHSA-f2f8-2ppj-85pf

Restart Required: Yes

Instructions:

1. Backup your Worklenz database and configuration. 2. Download version 2.1.7 from GitHub releases. 3. Replace existing installation with patched version. 4. Restart the Worklenz service. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for all user-supplied parameters in affected endpoints

WAF Rule

all

Deploy web application firewall rules to block SQL injection patterns

🧯 If You Can't Patch

  • Implement network segmentation to isolate Worklenz from critical systems
  • Enable database auditing and monitor for unusual SQL queries

🔍 How to Verify

Check if Vulnerable:

Check Worklenz version in admin panel or configuration files. If version is below 2.1.7, system is vulnerable.

Check Version:

Check package.json or admin interface for version number

Verify Fix Applied:

Confirm version is 2.1.7 or higher and test affected endpoints with safe SQL injection test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts followed by SQL syntax in requests
  • Long or malformed parameter values in HTTP requests

Network Indicators:

  • SQL keywords in HTTP parameters (SELECT, UNION, INSERT, etc.)
  • Unusual database connection patterns from application server

SIEM Query:

source="worklenz.logs" AND ("SQL syntax" OR "near '"'" OR "unclosed quotation")

🔗 References

📤 Share & Export