Cyber Posture

CVE-2025-26348

Medium

Published: 12 February 2025

Published
12 February 2025
Modified
24 October 2025
KEV Added
Patch
CVSS Score 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L
EPSS Score 0.0018 39.7th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.

Security Summary

CVE-2025-26348, published on 2025-02-12, is an SQL injection vulnerability (CWE-89) in the editUserMenu endpoint of maxprofile/menu/model.lua in Q-Free MaxTime versions less than or equal to 2.11.0. The flaw stems from improper neutralization of special elements used in an SQL command, enabling an authenticated remote attacker to execute arbitrary SQL commands via crafted HTTP requests.

An attacker requires high privileges (PR:H) to exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows arbitrary SQL command execution, resulting in high integrity impact (I:H) such as data modification and low availability impact (A:L), with no confidentiality impact (C:N) and unchanged scope (S:U), as reflected in its CVSS v3.1 base score of 5.5.

For mitigation guidance, refer to the vulnerability advisory from Nozomi Networks at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-26348.

Details

CWE(s)
CWE-89

Affected Products

q-free
maxtime
≤ 2.11.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

SQL injection vulnerability enables exploitation of public-facing web application (T1190) and arbitrary SQL command execution, facilitating data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction (T1485).

References