CVE-2025-56385
Published: 12 November 2025
Description
A SQL injection vulnerability exists in the login functionality of WellSky Harmony version 4.1.0.2.83 within the 'xmHarmony.asp' endpoint. User-supplied input to the 'TXTUSERID' parameter is not properly sanitized before being incorporated into a SQL query. Successful authentication may lead to…
more
authentication bypass, data leakage, or full system compromise of backend database contents.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of user-supplied input to the TXTUSERID parameter to prevent SQL injection in the xmHarmony.asp endpoint.
Mandates timely identification, reporting, and correction of the SQL injection flaw in WellSky Harmony version 4.1.0.2.83.
Ensures the organization reviews and applies security advisories and vendor updates for CVE-2025-56385 to remediate the vulnerability.
Security SummaryAI
A SQL injection vulnerability, tracked as CVE-2025-56385, affects the login functionality in WellSky Harmony version 4.1.0.2.83. The issue resides in the 'xmHarmony.asp' endpoint, where user-supplied input to the 'TXTUSERID' parameter is not properly sanitized before being incorporated into a SQL query. This flaw, classified under CWE-89, was published on 2025-11-12 and carries a CVSS v3.1 base score of 9.8.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation can enable authentication bypass, data leakage from the backend database, or full compromise of database contents, potentially leading to high impacts on confidentiality, integrity, and availability.
Advisories and additional details are available from vendor sites at http://harmony.com and http://wellsky.com, as well as a security blog analysis at https://machevalia.blog/blog/cve-2025-56385-wellsky-harmony-sql-injection.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in public-facing web application login endpoint (xmHarmony.asp) enables remote exploitation of public-facing application (T1190) for authentication bypass and facilitates data collection from backend databases via arbitrary SQL queries (T1213.006).