VYPR
Critical severityNVD Advisory· Published Mar 23, 2026· Updated May 19, 2026

CVE-2025-41007

CVE-2025-41007

Description

SQL Injection in Cuantis. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'search' parameter in the '/search.php' endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated SQL injection in Cuantis' search parameter allows attackers to retrieve, create, update, and delete entire databases.

Vulnerability

CVE-2025-41007 is a critical SQL injection vulnerability found in Cuantis sales software. The flaw exists in the search parameter of the /search.php endpoint. The root cause is the lack of proper sanitization or parameterization of user-supplied input, allowing an attacker to inject arbitrary SQL commands into the application's database query [1].

Attack

Vector This vulnerability is exploitable without authentication, requires no user interaction, and can be triggered over the network. An attacker simply sends a crafted HTTP request to the vulnerable endpoint with malicious SQL code embedded in the search parameter [1]. The CVSS v4.0 base score is 9.3 (Critical) with the vector AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N [1].

Impact

Successful exploitation allows an attacker to not only retrieve sensitive data from the database but also create, modify, and delete database records. This means an attacker could exfiltrate all customer and sales data, inject fraudulent records, corrupt existing data, or cause a complete loss of database integrity and availability [1].

Mitigation

As of the advisory publication date, no official patch or workaround has been released by Cuantis. Users are advised to monitor vendor channels for a security update and to consider applying generic input validation or a web application firewall (WAF) rule to block malicious SQL patterns in the search parameter as a temporary measure [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Cuantis/Cuantisllm-fuzzy2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: All versions

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.