Description
Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user2reset parameter. Attackers can send crafted requests with malicious SQL payloads to extract sensitive database information or modify data.
Published: 2026-04-05
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Theft
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an SQL injection flaw in Kados R10 GreenBee that can be triggered by unauthenticated users through the user2reset parameter. By injecting crafted SQL, an attacker can cause the application to execute arbitrary SQL commands, enabling the extraction of confidential data or modification of records. This compromise affects confidentiality and integrity of the database, potentially leading to data theft or corruption. The flaw is classified as CWE‑89, which denotes an injection flaw that permits untrusted input to influence database queries.

Affected Systems

The flaw targets the Marmotech Kados R10 GreenBee application. Any installation of Kados R10 GreenBee, regardless of patch level, is susceptible unless mitigated. The affected component is the user2reset functionality exposed via the web interface. Users running Kados R10 GreenBee should verify their version and apply any vendor‑supplied updates. In the absence of a patch, restricting access to the endpoint or applying configuration changes can reduce risk.

Risk and Exploitability

The CVSS base score of 8.8 signifies a high severity, and the EPSS score of less than 1 percent indicates a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known active exploitation at the time of analysis. The attack vector is likely over the network by sending a specially crafted HTTP request to the user2reset endpoint; authentication is not required. Exploitation requires only the ability to reach the vulnerable application, making it potentially accessible to any remote actor if the service is exposed.

Generated by OpenCVE AI on April 7, 2026 at 22:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑released patch or upgrade to the latest stable release of Kados R10 GreenBee.
  • If no patch is available, restrict network exposure of the Kados application by placing it behind a firewall or VPN and limiting access to trusted hosts.
  • Disable or patch the user2reset functionality if it is not required for normal operation.
  • Implement a web application firewall (WAF) rule set to block common SQL‑injection payloads.
  • Monitor application logs for abnormal activity on the user2reset endpoint and investigate any suspicious requests.

Generated by OpenCVE AI on April 7, 2026 at 22:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Marmotech
Marmotech kados
CPEs cpe:2.3:a:marmotech:kados:r10_greenbee:*:*:*:*:*:*:*
Vendors & Products Marmotech
Marmotech kados

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Kados
Kados kados R10 Greenbee
Vendors & Products Kados
Kados kados R10 Greenbee

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user2reset parameter. Attackers can send crafted requests with malicious SQL payloads to extract sensitive database information or modify data.
Title Kados R10 GreenBee SQL Injection via user2reset
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Kados Kados R10 Greenbee
Marmotech Kados
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T18:02:53.097Z

Reserved: 2026-04-05T15:34:13.324Z

Link: CVE-2019-25694

cve-icon Vulnrichment

Updated: 2026-04-06T17:58:46.415Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T21:16:48.150

Modified: 2026-04-07T19:19:02.590

Link: CVE-2019-25694

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:15Z

Weaknesses