2025-06-25 07:09
CHT Security Red Team Discovered a Vulnerability in a Well-Known BPM System.
Summary
Due to insufficient validation or sanitization of user input in a specific query function, authenticated users are able to perform SQL injection, potentially gaining the ability to read, modify, or delete data from the backend database.
Version
Version = v6.6.19
Remediation
1.User: Contact the vendor as soon as possible to discuss remediation measures.
2.System Developer: Avoid directly concatenating user input into SQL queries. Input validation and the use of parameterized queries or prepared statements should be implemented to prevent SQL injection attacks.
Credits
Sam Huang (CHT Security)