Description
qdPM 9.1 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the search_by_extrafields[] parameter. Attackers can send POST requests to the users endpoint with malicious search_by_extrafields[] values to trigger SQL syntax errors and extract database information.
Published: 2026-04-05
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic SQL injection that lets attackers inject arbitrary SQL code into the search_by_extrafields[] parameter of the users endpoint. By sending crafted POST requests, an adversary can trigger syntax errors and pull sensitive database information, potentially exposing user data and configuration. The flaw aligns with CWE‑89 and allows read or modify operations on the database, compromising confidentiality and integrity.

Affected Systems

Affected products are part of the Qdpm:qdPM family. CVE-2019-25669 specifically targets version 9.1, which is publicly documented. The product is also offered in 8.3, 9.0 and 9.2 variants, but only the 9.1 build is known to be vulnerable from the provided data. Administrators should verify whether their deployment runs the 9.1 release and check for newer versions that include the fix.

Risk and Exploitability

The CVSS score of 8.8 signals a high‑severity issue; the EPSS score of less than 1 % indicates a low immediate likelihood of exploitation, yet a public exploit (46387) exists in exploit‑db. Remote attackers can reach the vulnerable endpoint over HTTP/HTTPS, send a POST request containing a malicious search_by_extrafields[] value, and extract or modify database contents. The flaw does not require privileged local access and can be leveraged in a typical web‑exposed environment.

Generated by OpenCVE AI on April 9, 2026 at 20:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest qdPM update that addresses the SQL injection vulnerability.
  • If no official patch is available, restrict or block public access to the /users endpoint or the search_by_extrafields parameter.
  • Add application‑level input validation to sanitize the search_by_extrafields parameter and escape SQL characters.
  • Monitor web server logs for anomalous POST requests containing malformed SQL statements.
  • Ensure user accounts use strong authentication and limit database privileges to prevent broader compromise.

Generated by OpenCVE AI on April 9, 2026 at 20:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:qdpm:qdpm:*:*:*:*:*:*:*:*

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description qdPM 9.1 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the search_by_extrafields[] parameter. Attackers can send POST requests to the users endpoint with malicious search_by_extrafields[] values to trigger SQL syntax errors and extract database information.
Title qdPM 9.1 SQL Injection via search_by_extrafields Parameter
First Time appeared Qdpm
Qdpm qdpm
Weaknesses CWE-89
CPEs cpe:2.3:a:qdpm:qdpm:8.3:*:*:*:*:*:*:*
cpe:2.3:a:qdpm:qdpm:9.0:*:*:*:*:*:*:*
cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:*
cpe:2.3:a:qdpm:qdpm:9.2:*:*:*:*:*:*:*
Vendors & Products Qdpm
Qdpm qdpm
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:27:33.520Z

Reserved: 2026-04-05T13:09:00.828Z

Link: CVE-2019-25669

cve-icon Vulnrichment

Updated: 2026-04-06T15:22:53.369Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T21:16:44.430

Modified: 2026-04-09T19:38:38.813

Link: CVE-2019-25669

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:26Z

Weaknesses