{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-8220","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-26T08:58:22.562Z","datePublished":"2025-07-27T03:02:05.624Z","dateUpdated":"2025-10-11T21:13:14.253Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-11T21:13:14.253Z"},"title":"Engeman Web Password Recovery RecoveryPass sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Engeman","product":"Web","versions":[{"version":"12.0.0.0","status":"affected"},{"version":"12.0.0.1","status":"affected"},{"version":"12.0.0.2","status":"affected"},{"version":"12.0.0.3","status":"unaffected"}],"modules":["Password Recovery Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Engeman Web up to 12.0.0.2. The affected element is an unknown function of the file /Login/RecoveryPass of the component Password Recovery Page. The manipulation of the argument LanguageCombobox as part of Cookie leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 12.0.0.3 is sufficient to fix this issue. Upgrading the affected component is advised. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Engeman Web up to 12.0.0.2 gefunden. Es betrifft eine unbekannte Funktion der Datei /Login/RecoveryPass der Komponente Password Recovery Page. Durch Manipulieren des Arguments LanguageCombobox durch Cookie kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden. Ein Aktualisieren auf die Version 12.0.0.3 vermag dieses Problem zu lösen. Ein Upgrade der betroffenen Komponente wird empfohlen."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2025-07-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-07-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-27T00:00:00.000Z","lang":"en","value":"Exploit disclosed"},{"time":"2025-10-11T23:17:55.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"m3m0o (VulDB User)","type":"reporter"},{"lang":"en","value":"m3m0o (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.317808","name":"VDB-317808 | Engeman Web Password Recovery RecoveryPass sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.317808","name":"VDB-317808 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.616747","name":"Submit #616747 | Engeman Engeman Web <= 12.0.0.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/m3m0o/engeman-web-language-combobox-sqli","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://docs.google.com/document/d/1fbe1o3ncvmYbw-w1MKMUJg7z-qu1Wyo81y9isFlNyi0/edit?tab=t.0","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-28T14:59:46.376103Z","id":"CVE-2025-8220","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-28T14:59:50.191Z"}}]}}