Description
Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the filter_user_mail parameter. Attackers can send crafted requests with malicious SQL statements to extract sensitive database information or modify data.
Published: 2026-04-05
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection that can read or modify database content
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a classic SQL injection flaw where an attacker can supply arbitrary SQL through the filter_user_mail parameter. This can allow extraction of sensitive data or alteration of records, potentially compromising the confidentiality and integrity of the system’s database. The weakness matches CWE‑89, a typical string-based injection issue.

Affected Systems

Kados R10 GreenBee is affected. No specific firmware or minor version distinctions are listed, so any release of the Kados R10 GreenBee edition may potentially be vulnerable.

Risk and Exploitability

With a CVSS score of 8.8 the flaw is considered high severity. The EPSS score is below 1%, indicating that active exploitation is unlikely at present and it is not listed in the CISA KEV catalog. The attack likely occurs via HTTP requests to endpoints that accept the filter_user_mail parameter, so an attacker who can send requests to the vulnerable system—such as through the web application or a malicious network—could exploit it without needing privileged credentials. The overall risk is high because of the potential for data exposure or modification, but the actual exploitation probability is currently low.

Generated by OpenCVE AI on April 7, 2026 at 22:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If available, install the vendor‑provided update for Kados R10 GreenBee that addresses the SQL injection. If no patch is available, disable or remove the filter_user_mail functionality or restrict it to trusted users only. Apply a web application firewall rule to reject malformed SQL patterns in the filter_user_mail parameter. Monitor inbound requests for suspicious SQL injection attempts and log occurrences. Contact Kados support for a confirmed fix timeline if uncertain.
  • Configure secure database access controls so that even if injection succeeds, the database user has the least privileges necessary, limiting the scope of potential damage.

Generated by OpenCVE AI on April 7, 2026 at 22:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Marmotech
Marmotech kados
CPEs cpe:2.3:a:marmotech:kados:r10_greenbee:*:*:*:*:*:*:*
Vendors & Products Marmotech
Marmotech kados

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Kados
Kados kados R10 Greenbee
Vendors & Products Kados
Kados kados R10 Greenbee

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Kados R10 GreenBee contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the filter_user_mail parameter. Attackers can send crafted requests with malicious SQL statements to extract sensitive database information or modify data.
Title Kados R10 GreenBee SQL Injection via filter_user_mail
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Kados Kados R10 Greenbee
Marmotech Kados
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T18:13:37.841Z

Reserved: 2026-04-05T15:38:43.653Z

Link: CVE-2019-25704

cve-icon Vulnrichment

Updated: 2026-04-06T18:13:33.663Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T21:16:48.970

Modified: 2026-04-07T19:36:57.263

Link: CVE-2019-25704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:53:09Z

Weaknesses