Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-26852 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: SQL Injection in DESCOR INFOCAD. <br>πŸ’₯ **Consequences**: Full system compromise. Attackers can steal, modify, or delete data. Critical integrity and availability risks.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-89** (Improper Neutralization of Special Elements used in an SQL Command). <br>πŸ” **Flaw**: Unsanitized user input directly executed in database queries.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Descor. <br>πŸ“¦ **Product**: INFOCAD FM (BIM & Facility Management). <br>πŸ“‰ **Affected**: Versions **3.5.1 and earlier**.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: High. <br>πŸ“‚ **Data**: Full access to sensitive BIM and facility management data. <br>⚠️ **Impact**: Complete confidentiality, integrity, and availability loss (CVSS H).

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. <br>🌐 **Network**: Attack Vector is Network (AV:N). <br>πŸ”‘ **Auth**: No Privileges Required (PR:N). <br>πŸ‘€ **UI**: No User Interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Exploit**: Public references exist (Changelog). <br>🚫 **PoC**: No specific PoC code provided in data. <br>⚠️ **Risk**: Likely exploitable given CVSS 3.1/AV:N/AC:L.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for SQL injection patterns in web inputs. <br>πŸ› οΈ **Tool**: Use SQLMap or similar DAST tools on INFOCAD FM endpoints. <br>πŸ“‹ **Verify**: Check installed version against 3.5.1.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update to a version **newer than 3.5.1**. <br>πŸ“’ **Source**: Check Descor's official changelog for the patch. <br>βœ… **Status**: Patch available via vendor update.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Implement strict input validation. <br>πŸ›‘οΈ **Defense**: Use Web Application Firewall (WAF) rules to block SQL syntax. <br>πŸ”’ **Limit**: Restrict network access to the application if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>πŸ“… **Priority**: Immediate action required. <br>πŸš€ **Reason**: High CVSS score, no auth needed, network-accessible. Patch ASAP.