CRITICALCVE-2025-7744CVSS 9.8

SQLi in Dolusoft's Omaspot

翻译中…

平台

other

组件

omaspot

修复版本

12.09.2025

AI Confidence: highNVDEPSS 0.0%已审阅: 2026年5月
正在翻译为您的语言…

CVE-2025-7744 describes a SQL Injection vulnerability affecting Dolusoft Omaspot. This flaw allows attackers to inject malicious SQL code into queries, potentially granting them unauthorized access to sensitive data and control over the system. Versions prior to 12.09.2025 are vulnerable, and a patch has been released to address the issue.

影响与攻击场景翻译中…

The SQL Injection vulnerability in Omaspot poses a significant risk. An attacker could leverage this to bypass authentication, retrieve sensitive data such as user credentials, financial information, or customer details, and even modify or delete data within the database. Successful exploitation could lead to a complete compromise of the Omaspot system and potentially impact any connected systems or services. The impact is amplified if the database contains personally identifiable information (PII) or other confidential data, potentially leading to regulatory fines and reputational damage. This vulnerability shares characteristics with other SQL injection flaws, where attackers can manipulate database queries to achieve unauthorized actions.

利用背景翻译中…

CVE-2025-7744 was published on 2025-09-16. The vulnerability's criticality is high due to the potential for widespread data compromise. Public proof-of-concept exploits are currently unknown, but the SQL Injection nature of the vulnerability makes it likely that such exploits will emerge. Monitor security advisories and threat intelligence feeds for updates on exploitation activity.

哪些人处于风险中翻译中…

Organizations utilizing Dolusoft Omaspot in their operations, particularly those handling sensitive data, are at risk. This includes businesses relying on Omaspot for customer relationship management, inventory management, or other critical functions. Legacy Omaspot installations and those with inadequate security configurations are especially vulnerable.

攻击时间线

  1. Disclosure

    disclosure

威胁情报

漏洞利用状态

概念验证未知
CISA KEVNO
互联网暴露

EPSS

0.04% (10% 百分位)

CISA SSVC

利用情况none
可自动化yes
技术影响total

CVSS 向量

威胁情报· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H9.8CRITICALAttack VectorNetwork攻击者如何到达目标Attack ComplexityLow利用漏洞所需的条件Privileges RequiredNone攻击所需的认证级别User InteractionNone是否需要受害者采取行动ScopeUnchanged超出受影响组件的影响范围ConfidentialityHigh敏感数据泄露风险IntegrityHigh数据未授权篡改风险AvailabilityHigh服务中断风险nextguardhq.com · CVSS v3.1 基础分数
这些指标意味着什么?
Attack Vector
网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
Attack Complexity
低 — 无需特殊条件,可以稳定地利用漏洞。
Privileges Required
无 — 无需认证,无需凭证即可利用。
User Interaction
无 — 攻击自动且无声,受害者无需任何操作。
Scope
未改变 — 影响仅限于脆弱组件本身。
Confidentiality
高 — 完全丧失机密性,攻击者可读取所有数据。
Integrity
高 — 攻击者可写入、修改或删除任何数据。
Availability
高 — 完全崩溃或资源耗尽,完全拒绝服务。

受影响的软件

组件omaspot
供应商Dolusoft
影响范围修复版本
0 – 12.09.202512.09.2025

弱点分类 (CWE)

时间线

  1. 已保留
  2. 发布日期
  3. EPSS 更新日期

缓解措施和替代方案翻译中…

The primary mitigation for CVE-2025-7744 is to immediately upgrade Omaspot to version 12.09.2025 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds such as input validation and parameterized queries to sanitize user input and prevent SQL injection attacks. Web application firewalls (WAFs) configured with rules to detect and block SQL injection attempts can also provide an additional layer of protection. Thoroughly review and test any configuration changes before deploying them to a production environment. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection payload on a non-critical endpoint.

修复方法翻译中…

Actualice Omaspot a una versión posterior al 12.09.2025. Consulte el sitio web del proveedor, Dolusoft, para obtener la última versión y las instrucciones de actualización. Aplique las actualizaciones de seguridad proporcionadas por el proveedor lo antes posible.

CVE 安全通讯

漏洞分析和关键警报直接发送到您的邮箱。

常见问题翻译中…

What is CVE-2025-7744 — SQL Injection in Dolusoft Omaspot?

CVE-2025-7744 is a critical SQL Injection vulnerability in Dolusoft Omaspot versions 0-12.09.2025, allowing attackers to inject malicious SQL code and potentially compromise the system.

Am I affected by CVE-2025-7744 in Dolusoft Omaspot?

If you are using Dolusoft Omaspot versions prior to 12.09.2025, you are vulnerable to this SQL Injection flaw. Immediate action is required.

How do I fix CVE-2025-7744 in Dolusoft Omaspot?

Upgrade Omaspot to version 12.09.2025 or later. Implement temporary workarounds like input validation and WAF rules if immediate upgrade is not possible.

Is CVE-2025-7744 being actively exploited?

While no public exploits are currently known, the SQL Injection nature of the vulnerability suggests potential for exploitation. Continuous monitoring is recommended.

Where can I find the official Dolusoft advisory for CVE-2025-7744?

Refer to the official Dolusoft security advisory for CVE-2025-7744 on the Dolusoft website or through their support channels.

你的项目受影响吗?

上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。