CVE-2025-40886
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-07

Last updated on: 2025-10-09

Assigner: Nozomi Networks Inc.

Description
A SQL Injection vulnerability was discovered in the Alert functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SQL statements on the DBMS used by the web application, potentially exposing unauthorized data, altering their structure and content, and/or affecting their availability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-07
Last Modified
2025-10-09
Generated
2026-05-06
AI Q&A
2025-10-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
nozominetworks cmc to 25.2.0 (exc)
nozominetworks guardian to 25.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a SQL Injection in the Alert functionality of a web application. It occurs because an input parameter is not properly validated. An authenticated user with limited privileges can exploit this to execute arbitrary SQL statements on the database management system, potentially exposing unauthorized data, modifying data structure and content, or impacting availability.


How can this vulnerability impact me? :

The vulnerability can allow an attacker with limited access to execute arbitrary SQL commands, which may lead to unauthorized data exposure, data alteration, or disruption of the database availability. This can compromise the integrity, confidentiality, and availability of the data managed by the application.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart