Description
An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.
Published: 2026-04-02
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality breach
Action: Patch ASAP
AI Analysis

Impact

The vulnerability is an unauthenticated blind SQL injection in the mb24api endpoint of MB connect line products, allowing a remote attacker to retrieve arbitrary data from the database. Because the injection occurs without authentication, any user can exploit it, potentially exposing all information stored within the system. The weakness corresponds to CWE-89 and results in a complete loss of confidentiality, as attacker‑controlled queries can return sensitive content.

Affected Systems

Products affected are mbCONNECT24 and mymbCONNECT24 from MB connect line. Version information was not disclosed in the advisory, so administrators should verify whether their current installations encompass the vulnerable code base. The defect resides in the mb24api component responsible for handling external API calls.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity vulnerability with significant impact on confidentiality. EPSS data is not available, but the absence of the vulnerability from KEV catalog suggests no widely known active exploits yet; however, the blind nature of the injection and lack of authentication requirements increase its attractiveness to attackers. Exploitation would involve sending crafted input to the mb24api endpoint over the network, bypassing any standard authentication mechanism, and then reading the returned data, which could contain sensitive business information.

Generated by OpenCVE AI on April 2, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade the mbCONNECT24/mymbCONNECT24 software to a version that includes the fix for the mb24api endpoint.
  • If a patch is not yet available, restrict network access to the mb24api endpoint, allowing only trusted hosts or IP ranges.
  • Monitor the API logs for anomalous query patterns or repeated failed authentication attempts, as these may indicate ongoing exploitation.
  • Validate all input to the API manually or via security controls to ensure no further injection vectors remain.
  • Consider segmenting the network or placing the database behind an additional firewall to limit exposure.

Generated by OpenCVE AI on April 2, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Mbconnectline
Mbconnectline mbconnect24
Mbconnectline mymbconnect24
Vendors & Products Mbconnectline
Mbconnectline mbconnect24
Mbconnectline mymbconnect24

Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can exploit an unauthenticated blind SQL Injection vulnerability in the mb24api endpoint due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.
Title MB connect line mbCONNECT24 vulnerable to an unauthenticated SQL injection in the mb24api Endpoint
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Mbconnectline Mbconnect24 Mymbconnect24
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-04-02T13:08:18.951Z

Reserved: 2026-03-23T13:15:49.382Z

Link: CVE-2026-33616

cve-icon Vulnrichment

Updated: 2026-04-02T13:08:15.347Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T10:16:17.080

Modified: 2026-04-03T16:10:52.680

Link: CVE-2026-33616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:21:36Z

Weaknesses