CVE-2025-0585
Published: 20 January 2025
Summary
CVE-2025-0585 is a critical-severity SQL Injection (CWE-89) vulnerability in Aenrich A\+Hrd. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the SQL injection flaw in a+HRD software by identifying, testing, and installing vendor-provided patches or updates.
Prevents SQL injection by enforcing strict validation of all user inputs before they are used in database queries.
Boundary protection mechanisms like web application firewalls inspect network traffic and block SQL injection payloads targeting the vulnerable application.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated remote SQL injection in a public-facing application enables exploitation of T1190.
NVD Description
The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Deeper analysisAI
CVE-2025-0585 is a SQL injection vulnerability (CWE-89) affecting the a+HRD software from aEnrich Technology. Published on 2025-01-20, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue enables unauthenticated remote attackers to inject arbitrary SQL commands into the application.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges or user interaction. Successful exploitation allows attackers to read, modify, and delete database contents, resulting in high impacts to confidentiality, integrity, and availability.
Advisories from TWCERT/CC provide further details on the vulnerability, available at https://www.twcert.org.tw/en/cp-139-8373-91edc-2.html and https://www.twcert.org.tw/tw/cp-132-8372-19721-1.html.
Details
- CWE(s)