First published: Tue May 06 2025(Updated: )
SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘User’ parameter of the ‘ValidateUserAndWS’ endpoint.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
TCMAN GIM |
The vulnerability has been fixed by the TCMAN team in version 1280.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-40620 is classified as a critical severity SQL injection vulnerability.
To fix CVE-2025-40620, update TCMAN GIM to the latest version that addresses this SQL injection issue.
Any user of TCMAN's GIM version 11 is potentially affected by CVE-2025-40620.
Using CVE-2025-40620, an unauthenticated attacker can inject SQL statements to gain unauthorized access to database information.
No, exploitation of CVE-2025-40620 does not require authentication.