CVE-2025-26852
Published: 20 March 2025
Summary
CVE-2025-26852 is a critical-severity SQL Injection (CWE-89) vulnerability in Descor Infocad. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates SQL injection by validating and sanitizing untrusted inputs before incorporation into database queries.
Requires timely remediation of identified flaws, such as applying the vendor patch in DESCOR INFOCAD v3.5.2.0 to eliminate the SQL injection vulnerability.
Deploys boundary protections like web application firewalls to inspect traffic and block or detect SQL injection payloads targeting the vulnerable application.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a publicly accessible web application directly enables initial access via exploitation of public-facing applications.
NVD Description
DESCOR INFOCAD 3.5.1 and before and fixed in v.3.5.2.0 allows SQL Injection.
Deeper analysisAI
CVE-2025-26852 is a SQL injection vulnerability (CWE-89) present in DESCOR INFOCAD versions 3.5.1 and earlier. The flaw allows attackers to inject malicious SQL code into backend queries. It was published on 2025-03-20 and carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its network accessibility, low attack complexity, lack of privileges or user interaction needed, and high impacts across confidentiality, integrity, and availability with scope change.
Remote, unauthenticated attackers can exploit this vulnerability over the network without user interaction. By injecting crafted SQL payloads, they can execute arbitrary database commands, potentially leading to unauthorized data access, modification, deletion, or escalation to broader system compromise given the high impact ratings and scope change.
Mitigation is available in DESCOR INFOCAD v3.5.2.0, which addresses the SQL injection issue. Security practitioners should reference the product page at https://www.descor.com/prodotti/infocad and the changelog at https://www.infocadfm.com/changelog/sql-injection/ for patch details and upgrade instructions.
Details
- CWE(s)