First published: Fri Mar 28 2025(Updated: )
A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been classified as critical. Affected is an unknown function of the file /parameter/getFileTypeList.jsp. The manipulation of the argument typename leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gemalto SafeNet CDG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2927 has been classified as a critical vulnerability.
CVE-2025-2927 involves a SQL injection vulnerability due to manipulation of the argument typename.
Yes, CVE-2025-2927 can be exploited remotely.
CVE-2025-2927 affects ESAFENET CDG version 5.6.3.154.205.
To mitigate CVE-2025-2927, implement input validation and parameterized queries to prevent SQL injection.