An injection vulnerability has been discovered in the API feature in Digi On-Prem Manager, enabling an attacker with valid API tokens to inject SQL via crafted input.
The API is not enabled by default, and a valid API token is required to perform the attack.
The API is not enabled by default, and a valid API token is required to perform the attack.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://dom.nettec.no/security-advisories/DOM-25-001/ |
|
History
Mon, 17 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An injection vulnerability has been discovered in the API feature in Digi On-Prem Manager, enabling an attacker with valid API tokens to inject SQL via crafted input. The API is not enabled by default, and a valid API token is required to perform the attack. | |
| Title | Authenticated SQL injection in API - Digi On-Prem Manager | |
| Weaknesses | CWE-20 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Digi
Published:
Updated: 2025-11-17T16:46:47.902Z
Reserved: 2025-11-17T15:24:52.019Z
Link: CVE-2025-13319
Updated: 2025-11-17T16:45:37.610Z
Status : Received
Published: 2025-11-17T17:15:48.550
Modified: 2025-11-17T17:15:48.550
Link: CVE-2025-13319
No data.
OpenCVE Enrichment
No data.