A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database. 





Version 5.7.139

 has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.
Advisories

No advisories yet.

Fixes

Solution

Users are advised to mitigate risk by restricting access to the affected endpoint or upgrading to a supported alternative.


Workaround

Vendor recommendations: * Restrict access to your private intranet only * Implement a Web Application Firewall (WAF) to block malicious files * Consider using File Server Resource Manager with IIS to monitor file activity at the OS level

History

Mon, 17 Nov 2025 03:00:00 +0000

Type Values Removed Values Added
Description A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.
Title Unsanitized parameter input leading to SQL Injection vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: MON-CSIRT

Published:

Updated: 2025-11-17T02:48:25.684Z

Reserved: 2025-09-15T05:46:32.298Z

Link: CVE-2025-10460

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-17T03:15:55.170

Modified: 2025-11-17T03:15:55.170

Link: CVE-2025-10460

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.