SQL Injection vulnerability exists in Tirreno v0.9.5, specifically in the /admin/loadUsers API endpoint. The vulnerability arises due to unsafe handling of user-supplied input in the columns[0][data] parameter, which is directly used in SQL queries without proper validation or parameterization.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-26417 SQL Injection vulnerability exists in Tirreno v0.9.5, specifically in the /admin/loadUsers API endpoint. The vulnerability arises due to unsafe handling of user-supplied input in the columns[0][data] parameter, which is directly used in SQL queries without proper validation or parameterization.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Sep 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tirreno
Tirreno tirreno
CPEs cpe:2.3:a:tirreno:tirreno:0.9.5:*:*:*:*:*:*:*
Vendors & Products Tirreno
Tirreno tirreno

Tue, 02 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 02 Sep 2025 17:00:00 +0000

Type Values Removed Values Added
Description SQL Injection vulnerability exists in Tirreno v0.9.5, specifically in the /admin/loadUsers API endpoint. The vulnerability arises due to unsafe handling of user-supplied input in the columns[0][data] parameter, which is directly used in SQL queries without proper validation or parameterization.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-02T19:49:38.327Z

Reserved: 2025-08-13T00:00:00.000Z

Link: CVE-2025-55472

cve-icon Vulnrichment

Updated: 2025-09-02T19:49:33.847Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-02T17:15:35.950

Modified: 2025-09-11T21:19:43.863

Link: CVE-2025-55472

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.