CVE-2025-7636
Published: 10 February 2026
Summary
CVE-2025-7636 is a high-severity SQL Injection (CWE-89) vulnerability in Gov (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires input validation and error handling to neutralize special elements in SQL commands, comprehensively preventing SQL injection in ZEUS PDKS.
Mandates identification, reporting, and correction of flaws such as this SQL injection vulnerability in affected ZEUS PDKS versions.
Boundary protection with web application firewalls monitors and blocks network-based SQL injection attempts targeting ZEUS PDKS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible application directly enables exploitation of public-facing apps (T1190) for DB data access/modification.
NVD Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ergosis Security Systems Computer Industry and Trade Inc. ZEUS PDKS allows SQL Injection.This issue affects ZEUS PDKS: from <1.0.5.10 through 10022026. NOTE: The vendor was contacted…
more
early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2025-7636 is an SQL Injection vulnerability (CWE-89) due to improper neutralization of special elements in an SQL command within ZEUS PDKS from Ergosis Security Systems Computer Industry and Trade Inc. The issue affects ZEUS PDKS versions from before 1.0.5.10 through 10022026 and has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity.
The vulnerability can be exploited by low-privileged authenticated users over the network with low attack complexity and no user interaction required. Successful exploitation allows attackers to achieve high impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or deletion within the affected SQL database.
A related advisory is available from USOM at https://www.usom.gov.tr/bildirim/tr-26-0052. The vendor was contacted early regarding this disclosure but did not respond, and no patches or specific mitigations are noted in available information.
Details
- CWE(s)