Brief Summary of Centreon Web CVE-2025-6791 SQL Injection Vulnerability

This post provides a brief summary of CVE-2025-6791, a high-severity SQL injection vulnerability in Centreon Web's monitoring event logs module. It covers affected versions, technical details, patch information, and vendor security history based on available public sources.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-08-22

Brief Summary of Centreon Web CVE-2025-6791 SQL Injection Vulnerability
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers with basic user credentials can compromise the integrity of Centreon monitoring data by exploiting a SQL injection flaw in the event logs module. This vulnerability allows malicious payloads to be inserted into the database, potentially leading to unauthorized data access or manipulation across monitored systems.

Centreon is a widely used IT monitoring platform, deployed by enterprises and service providers to track the health and status of critical infrastructure. Its open-source and commercial offerings are popular due to their flexibility and integration capabilities. However, Centreon's history includes several notable security issues, making timely patching and security best practices essential for its user base.

Technical Information

CVE-2025-6791 is a second-order SQL injection vulnerability found in the monitoring event logs page of Centreon Web. The flaw is caused by improper neutralization of special elements used in SQL commands, classified under CWE-89. Attackers can alter HTTP requests to insert crafted payloads into the database. These payloads are not executed immediately but are stored and later processed by vulnerable SQL queries in the event logs module. When the application subsequently retrieves and processes this data, the malicious SQL executes, potentially exposing or altering sensitive monitoring information.

Key technical points:

  • The vulnerability requires authenticated access but does not require elevated privileges.
  • Exploitation involves submitting specially crafted input via HTTP requests to the event logs page.
  • The injected payload is stored in the database and executed during later operations (second-order injection).
  • The root cause is insufficient input sanitization and lack of parameterized queries in the affected module.

No public vulnerable code snippets are available at this time. The attack complexity is low, and exploitation can be achieved by any authenticated user with access to the monitoring event logs interface.

Patch Information

In response to the identified vulnerability, the DOMPurify team released version 3.2.4, which includes a crucial fix to address the mXSS-style bypass. The core of this fix involves modifying the regular expression used for detecting template literals. The previous regex pattern was:

/\$\{[^}]+\}/g

This pattern was susceptible to bypasses under certain configurations. To enhance security, the regex was updated to:

/\$\{[^}]+\}/

By removing the global flag (g), the new pattern ensures that only the first occurrence of a template literal is matched, preventing potential bypasses that could exploit multiple matches. This change effectively mitigates the risk associated with the incorrect template literal regular expression.

Additionally, version 3.2.4 introduces a feature allowing for the removal of specific hooks, providing developers with more granular control over the sanitization process. This enhancement is particularly useful for applications requiring customized sanitization logic.

To benefit from these improvements and ensure robust protection against mXSS vulnerabilities, it is strongly recommended to upgrade to DOMPurify version 3.2.4 or later. This update not only addresses the identified security issue but also enhances the library's flexibility and reliability in handling complex sanitization scenarios.

Patch source: https://github.com/cure53/DOMPurify/releases/tag/3.2.4

Affected Systems and Versions

  • Centreon Web 24.10.0 before 24.10.9
  • Centreon Web 24.04.0 before 24.04.16
  • Centreon Web 23.10.0 before 23.10.26

Any deployment running these versions or earlier within the specified ranges is vulnerable if the monitoring event logs module is accessible to authenticated users.

Vendor Security History

Centreon has experienced multiple critical vulnerabilities in recent years, including:

  • CVE-2024-23119: SQL injection in insertGraphTemplate function (CVSS 8.8)
  • CVE-2020-10945: Session identifier exposure and cross-site scripting
  • Other SQL injection and authentication bypass issues across various modules

The vendor typically responds with coordinated disclosures and timely patches, but the recurrence of similar flaws highlights persistent challenges in input validation and secure development practices.

References

Detect & fix
what others miss