First published: Tue May 06 2025(Updated: )
SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘User’ and “email” parameters of the ‘updatePassword’ endpoint.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
TCMAN GIM |
The vulnerability has been fixed by the TCMAN team in version 1280.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-40624 has a critical severity level as it allows unauthenticated attackers to perform SQL injection attacks.
To fix CVE-2025-40624, ensure to validate and sanitize user inputs and update to the latest version of TCMAN GIM that addresses this vulnerability.
CVE-2025-40624 affects all versions of TCMAN GIM up to the latest release that has not implemented the required security fixes.
Yes, CVE-2025-40624 can lead to data loss as an attacker can manipulate the database, allowing them to delete information.
Due to its nature of allowing SQL injection, CVE-2025-40624 poses a significant risk to any deployment of TCMAN GIM that has not secured the vulnerable parameters.