Cyber Posture

CVE-2025-2927

HighPublic PoC

Published: 28 March 2025

Published
28 March 2025
Modified
14 April 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0011 29.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2927 is a high-severity Injection (CWE-74) vulnerability in Esafenet Cdg. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation of untrusted inputs like the 'typename' parameter in /parameter/getFileTypeList.jsp.

prevent

Mandates timely remediation of the specific SQL injection flaw through patching or code fixes despite vendor non-response.

preventdetect

Provides boundary protection via web application firewalls to restrict access to the vulnerable endpoint and block anomalous 'typename' requests.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505 Server Software Component Persistence
Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.
Why these techniques?

SQL injection in public-facing web endpoint (/parameter/getFileTypeList.jsp) enables unauthenticated remote exploitation of public-facing applications (T1190). Allows arbitrary SQL execution on MSSQL server, facilitating abuse of server software components for potential RCE (T1505).

NVD Description

A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been classified as critical. Affected is an unknown function of the file /parameter/getFileTypeList.jsp. The manipulation of the argument typename leads to sql injection. It is possible to launch the attack…

more

remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2025-2927 is a critical SQL injection vulnerability (CWE-74, CWE-89) in ESAFENET CDG version 5.6.3.154.205. The flaw resides in an unknown function within the file /parameter/getFileTypeList.jsp, where manipulation of the 'typename' argument triggers the injection.

The vulnerability enables remote exploitation by unauthenticated attackers (PR:N) over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful attacks can result in limited impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), yielding a CVSS v3.1 base score of 7.3.

Advisories from VulDB and a related GitHub report indicate that the vendor was contacted early about the disclosure but provided no response or patches. The exploit has been publicly disclosed and may be actively used by attackers. Security practitioners should restrict access to the affected endpoint and monitor for anomalous requests involving the 'typename' parameter.

Details

CWE(s)

Affected Products

esafenet
cdg
5.6.3.154.205

CVEs Like This One

CVE-2025-1841Same product: Esafenet Cdg
CVE-2025-0788Same product: Esafenet Cdg
CVE-2025-0793Same product: Esafenet Cdg
CVE-2025-0789Same product: Esafenet Cdg
CVE-2025-0791Same product: Esafenet Cdg
CVE-2025-1840Same product: Esafenet Cdg
CVE-2025-1844Same product: Esafenet Cdg
CVE-2025-0786Same product: Esafenet Cdg
CVE-2025-0792Same product: Esafenet Cdg
CVE-2025-1845Same vendor: Esafenet

References