Home

Description

A SQL Injection vulnerability has been found in Epsilon RH by Grupo Castilla. This vulnerability allows an attacker to retrieve, create, update and delete database via sending a POST request using the parameter ‘sEstadoUsr’ in ‘/epsilonnetws/WSAvisos.asmx’.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-20 | Updated 2025-10-20 | Assigner INCIBE




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

3.03.36.010
affected

Credits

Pedro Gabaldón Juliá finder

Javier Medina Munuera finder

Antonio José Gálvez Sánchez finder

Alejandro Baño Andrés finder

Álvaro Piñero Laorden finder

References

www.incibe.es/...cert/notices/aviso/sql-injection-epsilon-rh

cve.org (CVE-2025-41028)

nvd.nist.gov (CVE-2025-41028)

Download JSON