EUVD-2025-208935

| CVE-2025-41008 CRITICAL
2026-03-23 INCIBE GHSA-8wgh-35g5-cg6v
9.3
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 23, 2026 - 13:30 euvd
EUVD-2025-208935
Analysis Generated
Mar 23, 2026 - 13:30 vuln.today
CVE Published
Mar 23, 2026 - 12:59 nvd
CRITICAL 9.3

Description

SQL injection vulnerability in Sinturno. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'client' parameter in the '/_adm/scripts/modalReport_data.php' endpoint.

Analysis

A SQL injection vulnerability exists in Sinturno that allows unauthenticated or low-privileged attackers to execute arbitrary SQL commands through the 'client' parameter in the '/_adm/scripts/modalReport_data.php' endpoint. This vulnerability enables complete database compromise including retrieval, creation, updating, and deletion of database objects. The vulnerability was reported by INCIBE and affects all versions of Sinturno; no CVSS score, EPSS data, or KEV status has been published, but the ability to perform CRUD operations on databases represents critical severity regardless of formal scoring.

Technical Context

Sinturno is a PHP-based application identified via CPE (cpe:2.3:a:sinturno:sinturno:*:*:*:*:*:*:*:*), and this vulnerability represents a classic SQL injection flaw classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The 'client' parameter in the '/_adm/scripts/modalReport_data.php' endpoint fails to properly sanitize or parameterize user input before incorporating it into SQL queries. This PHP application likely uses direct string concatenation or inadequate prepared statement implementation when constructing SQL commands, allowing attackers to break out of the intended query context and inject malicious SQL syntax.

Affected Products

Sinturno in all versions is affected, as indicated by the CPE string cpe:2.3:a:sinturno:sinturno:*:*:*:*:*:*:*:*. No version-specific patching information has been published. The vulnerability was reported by INCIBE-CERT, and affected organizations should consult the official notice at https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-sinturno for vendor remediation guidance and patch availability.

Remediation

Immediately contact Sinturno vendors or maintainers for security patches addressing SQL injection in the modalReport_data.php endpoint; apply patches to all instances as they become available. Until patches are deployed, implement immediate mitigations: enforce strict input validation and parameterized queries (prepared statements) for the 'client' parameter and all user-supplied inputs in the affected endpoint; deploy Web Application Firewall (WAF) rules to block SQL injection syntax in HTTP requests; restrict network access to the '/_adm/' administrative path to trusted IP ranges only; and conduct a full database audit for signs of unauthorized access or data exfiltration. Refer to INCIBE's advisory at https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-sinturno for official patch release information.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +46
POC: 0

Share

EUVD-2025-208935 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy