Impact
An authenticated SQL Injection (CWE-89) exists in the Koha staff interface endpoint /cgi-bin/koha/suggestion/suggestion.pl, specifically in the displayby parameter used by GetDistinctValues. A low‑privileged staff user can inject arbitrary SQL statements, allowing execution of unintended queries and exposure or modification of sensitive data. Successful exploitation can result in full compromise of the backend database, potentially allowing an attacker to read, alter, or delete stored information.
Affected Systems
The vulnerability affects Koha Community:Koha installations that expose the /cgi-bin/koha/suggestion/suggestion.pl endpoint for staff use. No specific version range is listed in the CNA data; however, the referenced bug fixes and the 25‑11‑01 release suggest that older or unpatched versions are vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, whereas the EPSS score of less than 1% points to low current exploit probability. The vulnerability is not listed in the CISA KEV catalog. The vulnerability requires authentication with staff credentials, and a low‑privileged staff role is sufficient to carry out the injection. The attack vector is therefore mediated through the authenticated staff interface, with no need for network‑level access beyond normal Koha staff login.
OpenCVE Enrichment