Description
eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to pdf.php with crafted SQL payloads in the 'id' parameter to extract sensitive database information including table names and schema details.
Published: 2026-04-12
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection available to authenticated attackers allowing arbitrary database queries
Action: Apply Patch
AI Analysis

Impact

A flaw in eBrigade ERP 4.5’s pdf.php file enables an authenticated user to inject malicious SQL into the id parameter, allowing the execution of arbitrary queries. The vulnerability can expose sensitive database content, alter data, or serve as a foothold for further attacks. The weakness is a classic SQL injection, classified as CWE‑89. The attack directly threatens the confidentiality and integrity of data controlled by the application.

Affected Systems

Only eBrigade ERP version 4.5 is documented as vulnerable. The problem resides in the pdf.php component of that release; no other product variants or later releases are indicated as affected.

Risk and Exploitability

The CVSS score of 7.1 signals a high-severity issue. No EPSS value is available and the vulnerability is not listed in the CISA KEV catalog, implying no widespread exploitation is known. Attackers must first authenticate to the application to access pdf.php; once authenticated, a crafted GET request with malicious SQL can be sent to retrieve or modify database information. The exploitation process requires moderate effort but offers significant payoff, making the threat appreciable.

Generated by OpenCVE AI on April 12, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update eBrigade ERP to the latest available version or apply the vendor’s official patch that addresses the pdf.php SQL injection.
  • If an immediate patch is not available, restrict access to pdf.php by permission or deny the endpoint to users who do not require it.
  • Ensure user accounts used by the application have least privilege, reducing the potential impact of a compromised account.
  • Monitor application logs for unusual GET requests to pdf.php or abnormal database activity and investigate promptly.

Generated by OpenCVE AI on April 12, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ebrigade:ebrigade:4.5:*:*:*:*:*:*:*

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Ebrigade
Ebrigade ebrigade
Vendors & Products Ebrigade
Ebrigade ebrigade

Sun, 12 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to pdf.php with crafted SQL payloads in the 'id' parameter to extract sensitive database information including table names and schema details.
Title eBrigade ERP 4.5 SQL Injection via pdf.php
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Ebrigade Ebrigade
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-13T17:28:35.299Z

Reserved: 2026-04-12T12:13:51.215Z

Link: CVE-2019-25707

cve-icon Vulnrichment

Updated: 2026-04-13T17:28:32.254Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-12T13:16:33.627

Modified: 2026-04-17T19:17:12.217

Link: CVE-2019-25707

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:55:50Z

Weaknesses