CVE-2024-45876
Description
The login form of baltic-it TOPqw Webportal v1.35.283.2 (fixed in version 1.35.283.4) at /Apps/TOPqw/Login.aspx is vulnerable to SQL injection. The vulnerability exists in the POST parameter txtUsername, which allows for manipulation of SQL queries.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated SQL injection in TOPqw Webportal login form allows attackers to manipulate SQL queries via the txtUsername parameter, potentially compromising the entire database of sensitive citizen data.
Vulnerability
Description CVE-2024-45876 is an unauthenticated SQL injection vulnerability in the login form of baltic-it TOPqw Webportal version 1.35.283.2. The flaw resides in the POST parameter txtUsername on the page /Apps/TOPqw/Login.aspx. Sending a single quote in the username field triggers an SQL error message, confirming the injection point. The root cause is insufficient sanitization or parameterization of user input before constructing SQL queries. [1]
Exploitation
An attacker can exploit this vulnerability without any prior authentication or network position beyond normal access to the web application's login page. By injecting SQL payloads into the txtUsername parameter, the attacker can manipulate the underlying SQL queries. The presence of SQL error messages simplifies the exploitation process, enabling both manual and automated SQL injection techniques to extract or modify database contents. [1]
Impact
The impact is critical despite the CVSS base score of 6.5 (Medium). A successful SQL injection allows an attacker to gain complete access over the database. The TOPqw Webportal stores sensitive personal information about citizens and confidential documents, such as applications for social matters, for over 12 German federal states. Compromise of this data could lead to severe privacy breaches and potential misuse of information. [1]
Mitigation
The vendor, bit baltic information technologies GmbH, released a fix in version 1.35.283.4. Organizations using the affected version should update immediately. No workarounds are mentioned, but the vendor responded quickly following responsible disclosure. The CVE-2024-45876 is not listed in CISA's Known Exploited Vulnerabilities catalog as of this writing. [1]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.35.283.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.