Home

Description

A SQL Injection vulnerability was discovered in the Alert functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SQL statements on the DBMS used by the web application, potentially exposing unauthorized data, altering their structure and content, and/or affecting their availability.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-07 | Updated 2025-10-07 | Assigner Nozomi




HIGH: 7.7CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version before 25.2.0
affected

Default status
unaffected

Any version before 25.2.0
affected

Credits

This issue was found by Andrea Palanca of Nozomi Networks Product Security team during an internal investigation. finder

References

security.nozominetworks.com/NN-2025:7-01

cve.org (CVE-2025-40886)

nvd.nist.gov (CVE-2025-40886)

Download JSON