VYPR
Medium severity5.4NVD Advisory· Published Oct 16, 2025· Updated Apr 15, 2026

CVE-2025-56700

CVE-2025-56700

Description

Boolean SQL injection vulnerability in the web app of Base Digitale Group spa product Centrax Open PSIM version 6.1 allows a low level priviliged user that has access to the platform, to execute arbitrary SQL commands via the datafine parameter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Centrax Open PSIM 6.1 contains a boolean SQL injection in the datafine parameter of the /sinottici/graphstorico component, exploitable by low-privileged users.

Vulnerability

Overview The web application of Centrax Open PSIM version 6.1 is affected by a boolean SQL injection vulnerability in the /sinottici/graphstorico component. The datafine parameter in the JSON POST request is not properly sanitized, allowing an attacker to inject arbitrary SQL commands into the back-end database query [1][2].

Attack

Vector An attacker with a low-privileged account on the platform can exploit this by sending a crafted POST request to /sinottici/graphstorico with a malicious value in the datafine field [2]. The proof-of-concept demonstrates a time-based boolean SQL injection payload within the datafine parameter, confirming that no additional authentication bypass is required beyond the initial login [2]. This makes the attack accessible to any authenticated user, increasing its practical risk despite the lower privilege requirement.

Impact

Successful exploitation allows the attacker to read, modify, or delete data stored in the database [2]. This could lead to unauthorized access to sensitive information, manipulation of system configuration, or data loss. The impact is amplified in an operational security environment where Centrax Open PSIM manages video surveillance and access control systems [1].

Mitigation

Base Digitale has not officially released an advisory, but the vulnerability affects version 6.1 and prior [2]. Upgrading to Centrax Open PSIM version greater than 6.1 is recommended as the primary mitigation [2]. Users should also apply input validation and parameterized queries as a general security practice.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.