Description
A vulnerability in a subset of REST APIs of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, low-privileged, remote attacker to conduct a blind SQL injection attack.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to an affected API. A successful exploit could allow the attacker to view data in some database tables on an affected device.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-20272, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-20272 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/SQL-Injection
- https://capec.mitre.org/data/definitions/108.html
- https://capec.mitre.org/data/definitions/109.html
- https://capec.mitre.org/data/definitions/110.html
- https://capec.mitre.org/data/definitions/470.html
- https://capec.mitre.org/data/definitions/66.html
- https://capec.mitre.org/data/definitions/7.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-20272