Impact
The vulnerability arises from unsanitized input in the webhook edit and scanner API endpoints of Tarkov Data Manager. An attacker who has acquired valid user credentials can inject SQL statements, enabling the execution of arbitrary queries against the MySQL database. This can result in unauthorized read, modification, or deletion of any database content, compromising confidentiality, integrity, and possibly availability.
Affected Systems
All instances of Tarkov Data Manager running versions before commit 9bdb3a75a98a7047b6d70144eb1da1655d6992a8 are affected. The patch included in that commit resolves the flaw.
Risk and Exploitability
The CVSS base score of 7.2 indicates high severity, while the EPSS score of less than 1% suggests that exploitation has not been observed frequently in the wild. The flaw is authenticated, so an attacker requires legitimate credentials or a compromised account to exploit it. Once authenticated, the attacker can execute arbitrary SQL, posing a serious risk to data integrity and confidentiality. The vulnerability is not listed in the CISA KEV catalog, implying no confirmed active exploitation at this time.
OpenCVE Enrichment