A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.
History

Mon, 17 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 17 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Beims
Beims contractorweb.net
Vendors & Products Beims
Beims contractorweb.net

Mon, 17 Nov 2025 03:00:00 +0000

Type Values Removed Values Added
Description A SQL Injection vulnerability on an endpoint in BEIMS Contractor Web, a legacy product that is no longer maintained or patched by the vendor, allows an unauthorised user to retrieve sensitive database contents via unsanitized parameter input. This vulnerability occurs due to improper input validation on /BEIMSWeb/contractor.asp endpoint and successful exploitation requires a contractor.asp endpoint open to the internet. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity and potentially the availability of the database.  Version 5.7.139  has been confirmed as vulnerable. Other versions have not been confirmed by the vendor and users should assume that all versions of BEIMS Contractor Web may be impacted until further guidance is provided by the vendor.
Title Unsanitized parameter input leading to SQL Injection vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:H/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: MON-CSIRT

Published: 2025-11-17T02:48:25.684Z

Updated: 2025-11-17T16:42:22.769Z

Reserved: 2025-09-15T05:46:32.298Z

Link: CVE-2025-10460

cve-icon Vulnrichment

Updated: 2025-11-17T16:42:07.420Z

cve-icon NVD

Status : Received

Published: 2025-11-17T03:15:55.170

Modified: 2025-11-17T03:15:55.170

Link: CVE-2025-10460

cve-icon Redhat

No data.