i-doit CMDB 1.12 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the objGroupID parameter. Attackers can send GET requests with crafted SQL payloads in the objGroupID parameter to extract sensitive database information including usernames, database names, and version details.
PUBLISHED5.2CWE-89
i-doit CMDB 1.12 SQL Injection via objGroupID Parameter
Problem type
Affected products
I-Doit
doit CMDB
1.12 - AFFECTED
References
ExploitDB-46134
https://www.exploit-db.com/exploits/46134
Official Product Homepage
https://www.i-doit.org/
Product Reference
https://netcologne.dl.sourceforge.net/project/i-doit/i-doit/1.12/idoit-open-1.12.zip
VulnCheck Advisory: i-doit CMDB 1.12 SQL Injection via objGroupID Parameter
https://www.vulncheck.com/advisories/i-doit-cmdb-sql-injection-via-objgroupid-parameter
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25581Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25581",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-03-21T15:30:39.536Z",
"dateReserved": "2026-03-21T15:29:20.744Z",
"datePublished": "2026-03-21T15:30:39.536Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-03-21T15:30:39.536Z"
},
"title": "i-doit CMDB 1.12 SQL Injection via objGroupID Parameter",
"descriptions": [
{
"lang": "en",
"value": "i-doit CMDB 1.12 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the objGroupID parameter. Attackers can send GET requests with crafted SQL payloads in the objGroupID parameter to extract sensitive database information including usernames, database names, and version details."
}
],
"affected": [
{
"vendor": "I-Doit",
"product": "doit CMDB",
"versions": [
{
"version": "1.12",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/46134",
"name": "ExploitDB-46134",
"tags": [
"exploit"
]
},
{
"url": "https://www.i-doit.org/",
"name": "Official Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://netcologne.dl.sourceforge.net/project/i-doit/i-doit/1.12/idoit-open-1.12.zip",
"name": "Product Reference",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/i-doit-cmdb-sql-injection-via-objgroupid-parameter",
"name": "VulnCheck Advisory: i-doit CMDB 1.12 SQL Injection via objGroupID Parameter",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "Ihsan Sencan",
"type": "finder"
}
]
}
}
}