CVE-2025-58462 describes a critical SQL Injection vulnerability affecting OPEXUS FOIAXpress Public Access Link (PAL) versions prior to 11.13.1.0. This flaw allows a remote, unauthenticated attacker to manipulate the underlying database, potentially leading to data breaches and system compromise. The vulnerability resides in the SearchPopularDocs.aspx endpoint and is addressed with the release of version 11.13.1.0.
影响与攻击场景翻译中…
The SQL Injection vulnerability in FOIAXpress PAL poses a significant risk to organizations utilizing this software. An attacker exploiting this flaw can bypass authentication and directly interact with the database. This allows for unauthorized access to sensitive data, including personally identifiable information (PII), confidential documents, and system configuration details. The attacker could also modify or delete data, leading to data loss and disruption of services. The lack of authentication requirements amplifies the risk, as any external user can attempt exploitation. Successful exploitation could result in a complete compromise of the system and its data, similar to scenarios where database credentials are leaked or improperly configured.
利用背景翻译中…
CVE-2025-58462 was publicly disclosed on 2025-09-09. The vulnerability's CRITICAL CVSS score indicates a high probability of exploitation. As of this writing, there are no publicly available proof-of-concept exploits, but the ease of exploitation inherent in SQL injection vulnerabilities suggests that such exploits are likely to emerge. It is not currently listed on the CISA KEV catalog.
哪些人处于风险中翻译中…
Organizations utilizing FOIAXpress PAL for public document access are at risk, particularly those with older, unpatched installations. Shared hosting environments where multiple users share the same database instance are especially vulnerable, as a compromise of one user's account could lead to a broader data breach. Organizations relying on FOIAXpress PAL for sensitive data management should prioritize patching.
检测步骤翻译中…
• linux / server: Monitor access logs for requests to SearchPopularDocs.aspx containing unusual characters or SQL keywords (e.g., UNION, SELECT, INSERT, DELETE).
grep -i 'UNION|SELECT|INSERT|DELETE' /var/log/apache2/access.log | grep SearchPopularDocs.aspx• generic web: Use curl to test the SearchPopularDocs.aspx endpoint with various SQL injection payloads to observe the application's response.
curl 'http://your-foiaxpress-server/SearchPopularDocs.aspx?q=1+UNION+SELECT+@@version' -v• database (mysql): If database access is possible, check for unusual database entries or modifications that could indicate exploitation.
SELECT * FROM users WHERE username LIKE '%malicious%';攻击时间线
- Disclosure
disclosure
威胁情报
漏洞利用状态
EPSS
0.08% (24% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2025-58462 is to immediately upgrade FOIAXpress PAL to version 11.13.1.0 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restrict access to the SearchPopularDocs.aspx endpoint using a Web Application Firewall (WAF) or proxy server, implementing strict input validation rules to filter out potentially malicious SQL queries. Regularly review database access logs for suspicious activity and implement strong database security practices, including least privilege access controls. Consider implementing a Content Security Policy (CSP) to restrict the resources that the application can load, further limiting the potential impact of a successful SQL injection attack.
修复方法翻译中…
Actualice FOIAXpress Public Access Link (PAL) a la versión 11.13.1.0 o superior. Esta versión corrige la vulnerabilidad de inyección SQL. Consulte las notas de la versión en el sitio web del proveedor para obtener más detalles sobre la actualización.
CVE 安全通讯
漏洞分析和关键警报直接发送到您的邮箱。
常见问题翻译中…
What is CVE-2025-58462 — SQL Injection in FOIAXpress PAL?
CVE-2025-58462 is a critical SQL Injection vulnerability in OPEXUS FOIAXpress Public Access Link (PAL) versions 0–11.13.1.0, allowing attackers to manipulate the database.
Am I affected by CVE-2025-58462 in FOIAXpress PAL?
If you are running FOIAXpress PAL versions 0–11.13.1.0, you are vulnerable to this SQL Injection flaw.
How do I fix CVE-2025-58462 in FOIAXpress PAL?
Upgrade to version 11.13.1.0 or later. As a temporary workaround, restrict access to SearchPopularDocs.aspx with a WAF and implement input validation.
Is CVE-2025-58462 being actively exploited?
While no public exploits are currently available, the vulnerability's severity suggests a high likelihood of exploitation.
Where can I find the official OPEXUS advisory for CVE-2025-58462?
Refer to the OPEXUS website or security mailing lists for the official advisory regarding CVE-2025-58462.