CVE-2025-47651

| EUVD-2025-17523 HIGH
2025-06-09 [email protected]
8.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17523
CVE Published
Jun 09, 2025 - 16:15 nvd
HIGH 8.5

DescriptionNVD

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infility Infility Global allows SQL Injection. This issue affects Infility Global: from n/a through 2.12.4.

AnalysisAI

A SQL injection vulnerability in Infility Global (CWE-89) allows authenticated attackers to execute arbitrary SQL queries with network access, potentially leading to unauthorized data disclosure and limited availability impact. The vulnerability affects Infility Global versions up to and including 2.12.4, and the CVSS 8.5 score reflects high confidentiality impact; however, without confirmation of active exploitation (KEV status) or public POC availability, real-world risk depends on deployment prevalence and attacker motivation.

Technical ContextAI

This vulnerability represents improper neutralization of special SQL metacharacters in user-supplied input passed to SQL command execution contexts (CWE-89: SQL Injection). The flaw exists in Infility Global, an enterprise application platform used for business process management and data integration. The affected component fails to implement parameterized queries or input validation/sanitization before constructing SQL statements. Attackers with valid credentials (PR:L in CVSS vector) can inject malicious SQL syntax to bypass query logic, extract sensitive data from backend databases, or manipulate query results. The scope change (S:C) indicates the vulnerability can affect resources beyond the vulnerable application component itself, suggesting shared database resources or cross-application data exposure.

RemediationAI

  1. Immediate: Upgrade Infility Global to the first patched version after 2.12.4 (presumed 2.12.5 or later pending vendor confirmation). 2) Interim mitigations pending patch deployment: (a) Restrict network access to Infility Global to trusted IP ranges and VPNs to reduce attack surface despite PR:L requirement; (b) Implement database activity monitoring (DAM) to detect anomalous SQL queries executed by compromised or malicious accounts; (c) Apply least-privilege database account permissions, limiting application service accounts to minimum necessary SQL operations; (d) Conduct code review of custom SQL query construction in Infility Global modules to identify and remediate similar injection flaws. 3) Post-remediation: Update to 2.12.5+ and validate patch installation through vendor testing procedures. Reference: Contact Infility support or check official security advisories at [vendor advisory URL—to be obtained from vendor security page].

Share

CVE-2025-47651 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy