A Boolean-based SQL injection vulnerability was discovered in Axelor 5.2.4 via the _domain parameter. An attacker can manipulate the SQL query logic and determine true/false conditions, potentially leading to data exposure or further exploitation.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Axelor
Axelor axelor
Vendors & Products Axelor
Axelor axelor

Tue, 05 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 20:30:00 +0000

Type Values Removed Values Added
Description A Boolean-based SQL injection vulnerability was discovered in Axelor 5.2.4 via the _domain parameter. An attacker can manipulate the SQL query logic and determine true/false conditions, potentially leading to data exposure or further exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-05T13:49:26.801Z

Reserved: 2025-06-16T00:00:00.000Z

Link: CVE-2025-50341

cve-icon Vulnrichment

Updated: 2025-08-05T13:47:53.157Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-04T21:15:30.260

Modified: 2025-08-05T14:34:17.327

Link: CVE-2025-50341

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-12T12:05:42Z