First published: Tue May 06 2025(Updated: )
SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘Sender’ and “email” parameters of the ‘createNotificationAndroid’ endpoint.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
TCMAN GIM |
The vulnerability has been fixed by the TCMAN team in version 1280.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-40623 is considered a critical severity vulnerability due to its potential to expose the entire database to unauthorized access.
To fix CVE-2025-40623, ensure that your TCMAN GIM application is updated to the latest version that includes a patch for this SQL injection vulnerability.
CVE-2025-40623 is an SQL injection vulnerability that allows attackers to manipulate database queries.
Users of TCMAN GIM v11 are affected by CVE-2025-40623, especially if they are running an outdated version.
Yes, CVE-2025-40623 can be exploited remotely by unauthenticated attackers who can send crafted requests to the application.