CVE-2025-54058: SQL Injection (Blind Time-Based) Vulnerability in idatendido_familiares
Parameter on dependente_editarEndereco.php
Endpoint
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-54058
Summary
A SQL Injection vulnerability was discovered in the idatendido_familiares
parameter of the /html/funcionario/dependente_editarEndereco.php
endpoint. This issue allows any unauthenticated attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.
Details
The application fails to properly sanitize user-supplied input in the idatendido_familiares
parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.
PoC
Vulnerable Endpoint: /html/funcionario/dependente_editarEndereco.php
Parameter: idatendido_familiares
Save the request in req.txt
file:
|
|
Then, use sqlmap
:
|
|
Impact
- Unauthorized access to sensitive data (e.g., users, passwords, logs).
- Database enumeration (schemas, tables, users, versions).
- Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).
- Full compromise of the application if chained with other vulnerabilities.
- This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.
Reference
https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-5pwp-39jc-wxj8
Finder
Contributor
By: CVE-Hunters