Home

Description

A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.

PUBLISHED Reserved 2025-09-15 | Published 2025-11-17 | Updated 2025-11-17 | Assigner MON-CSIRT




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:L/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
affected

5.7
affected

Credits

Nicholas Page reporter

References

help.fmiworks.com/knowledge/beims-web

help.fmiworks.com/...contractor-web-operational-requirements

cve.org (CVE-2025-10460)

nvd.nist.gov (CVE-2025-10460)

Download JSON