Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Grupo Castilla
Grupo Castilla epsilon Rh |
|
| Vendors & Products |
Grupo Castilla
Grupo Castilla epsilon Rh |
Mon, 20 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL Injection vulnerability has been found in Epsilon RH by Grupo Castilla. This vulnerability allows an attacker to retrieve, create, update and delete database via sending a POST request using the parameter ‘sEstadoUsr’ in ‘/epsilonnetws/WSAvisos.asmx’. | |
| Title | SQL injection in Epsilon RH | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-20T12:42:02.576Z
Reserved: 2025-04-16T09:09:26.929Z
Link: CVE-2025-41028
Updated: 2025-10-20T12:41:16.477Z
Status : Deferred
Published: 2025-10-20T09:15:32.033
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41028
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:55Z