SQL injection vulnerability in the fields of warehouse document filtering form in SIMPLE.ERP software allows logged-in user to send a payload of up to 20 characters. Identified use case allows to delete tables with a name of maximum 6 characters. We weren't able to identify a way to exfiltrate data within query character limit.
This issue affects SIMPLE.ERP in versions before 6.30@a04.3.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simple Sa
Simple Sa simple.erp |
|
| Vendors & Products |
Simple Sa
Simple Sa simple.erp |
Tue, 21 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References | ||
| Metrics |
ssvc
|
Tue, 21 Oct 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection vulnerability in the fields of warehouse document filtering form in SIMPLE.ERP software allows logged-in user to send a payload of up to 20 characters. Identified use case allows to delete tables with a name of maximum 6 characters. We weren't able to identify a way to exfiltrate data within query character limit. This issue affects SIMPLE.ERP in versions before 6.30@a04.3. | |
| Title | SQL Injection in SIMPLE.ERP | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-10-21T13:34:32.571Z
Updated: 2025-10-21T14:03:41.449Z
Reserved: 2025-08-22T07:58:41.809Z
Link: CVE-2025-9339
Updated: 2025-10-21T14:03:37.144Z
Status : Awaiting Analysis
Published: 2025-10-21T14:15:49.130
Modified: 2025-10-21T19:31:25.450
Link: CVE-2025-9339
No data.