CVE-2025-1389
Published: 17 February 2025
Summary
CVE-2025-1389 is a high-severity SQL Injection (CWE-89) vulnerability in Learningdigital Orca Hcm. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating and sanitizing user inputs at entry points to block arbitrary SQL command execution.
Ensures timely identification, reporting, and patching of the specific SQL injection flaw in Orca HCM as described in CVE-2025-1389.
Facilitates obtaining and implementing vendor advisories and patches for known vulnerabilities like CVE-2025-1389 to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible web application directly maps to T1190 for initial access via public-facing app exploitation; arbitrary SQL execution on the database enables T1213.006 for direct data access/manipulation from information repositories.
NVD Description
Orca HCM from Learning Digital has a SQL Injection vulnerability, allowing attackers with regular privileges to inject arbitrary SQL commands to read, modify, and delete database contents.
Deeper analysisAI
CVE-2025-1389 is a SQL injection vulnerability (CWE-89) affecting Orca HCM, a human capital management software product from Learning Digital. Published on 2025-02-17, the flaw enables attackers to inject arbitrary SQL commands into the application, allowing them to read, modify, and delete database contents. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its network accessibility, low complexity, and significant impacts on confidentiality, integrity, and availability.
Attackers with low (regular) privileges can exploit this vulnerability remotely without requiring user interaction. Exploitation involves crafting malicious SQL inputs that execute arbitrary commands on the underlying database, potentially granting unauthorized access to sensitive data, altering records, or causing data loss across the affected system.
Advisories detailing mitigations and patches are available from TWCERT/CC at https://www.twcert.org.tw/en/cp-139-8432-4b516-2.html and https://www.twcert.org.tw/tw/cp-132-8431-61e42-1.html.
Details
- CWE(s)