Home

Description

ELBA5 5.8.0 contains a remote code execution vulnerability that allows attackers to obtain database credentials and execute arbitrary commands with SYSTEM level permissions. Attackers can connect to the database using default connector credentials, decrypt the DBA password, and execute commands via the xp_cmdshell stored procedure or add backdoor users to the BEDIENER table.

PUBLISHED Reserved 2026-04-22 | Published 2026-04-22 | Updated 2026-04-22 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Inadequate Encryption Strength

Product status

Default status
unaffected

5.8.0 (semver)
affected

Credits

Florian Bogner finder

References

www.exploit-db.com/exploits/45905 (ExploitDB-45905) exploit

www.elba.at (Official Product Homepage) product

www.vulncheck.com/...mote-code-execution-via-database-access (VulnCheck Advisory: ELBA5 5.8.0 Remote Code Execution via Database Access) third-party-advisory

cve.org (CVE-2018-25272)

nvd.nist.gov (CVE-2018-25272)

Download JSON