First published: Fri Apr 25 2025(Updated: )
In Sherpa Orchestrator 141851, multiple time-based blind SQL injections can be performed by an authenticated user. This affects api/gui/asset/list, /api/gui/files/export/csv/, /api/gui/files/list, /api/gui/process/export/csv, /api/gui/process/export/xlsx, /api/gui/process/listAll, /api/gui/processVersion/export/csv/, /api/gui/processVersion/export/xlsx/, /api/gui/processVersion/list/, /api/gui/robot/list/, /api/gui/task/export/csv/, /api/gui/task/export/xlsx/, and /api/gui/task/list/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sherpa Orchestrator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46546 has been classified with a high severity due to the potential for multiple time-based blind SQL injection attacks by authenticated users.
To fix CVE-2025-46546, you should apply the latest patches provided by Sherpa for Orchestrator or implement input validation and parameterized queries to prevent SQL injection.
CVE-2025-46546 affects authenticated users of Sherpa Orchestrator version 141851 and its related API endpoints.
Exploiting CVE-2025-46546 could lead to unauthorized access to sensitive data through SQL injection, which can compromise the integrity of the application.
To mitigate risks related to CVE-2025-46546, restrict access to affected endpoints and monitor for suspicious activities while awaiting a fix from Sherpa.