{"id":80811,"date":"2025-10-02T22:41:27","date_gmt":"2025-10-02T22:41:27","guid":{"rendered":""},"modified":"2025-10-03T23:18:48","modified_gmt":"2025-10-04T05:18:48","slug":"cve-2025-60118-sql-injection-vulnerability-in-potenzaglobalsolutions-pgs-core","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-60118-sql-injection-vulnerability-in-potenzaglobalsolutions-pgs-core\/","title":{"rendered":"<strong>CVE-2025-60118: SQL Injection Vulnerability in Potenzaglobalsolutions PGS Core<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The world of cybersecurity is rife with threats, and the Common Vulnerabilities and Exposures (CVE) system is instrumental in indexing these threats. This blog post focuses on a specific vulnerability, CVE-2025-60118, a significant security threat that affects Potenzaglobalsolutions PGS Core. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41032-critical-sql-injection-vulnerability-in-apprain-cmf-4-0-5\/\"  data-wpil-monitor-id=\"87998\">vulnerability is a classic SQL Injection<\/a> issue, a type of exploit that targets the database layer of an application, potentially resulting in system compromise or data leakage.<br \/>\nThis <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-58353-critical-vulnerability-in-promptcraft-forge-studio-due-to-regex-blacklist-sanitization\/\"  data-wpil-monitor-id=\"88646\">vulnerability is paramount due<\/a> to its potential for damage and the widespread use of the affected product, PGS Core, in various applications. With a CVSS Severity Score of 8.5, it underscores the urgent need for organizations using PGS Core to apply necessary patches or adopt appropriate mitigation strategies.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-60118<br \/>\nSeverity: High (8.5)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2021-26383-critical-vulnerability-in-amd-tee-puts-system-integrity-and-data-availability-in-jeopardy\/\"  data-wpil-monitor-id=\"88045\">System compromise or data<\/a> leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1022913589\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Potenzaglobalsolutions PGS Core | Up to version 5.9.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit works by manipulating the SQL queries in the application. Specifically, an attacker can input malicious SQL statements into the application, which are then executed by the database. The application fails to adequately sanitize the user input, leading to an <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-58628-sql-injection-vulnerability-in-kamleshyadav-miraculous\/\"  data-wpil-monitor-id=\"88001\">SQL injection vulnerability<\/a>. This could allow an attacker to manipulate the application&#8217;s SQL queries, potentially leading to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52954-unauthorized-root-access-vulnerability-in-junos-os-evolved\/\"  data-wpil-monitor-id=\"88195\">unauthorized access<\/a> to data, data corruption, or even complete system compromise.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3052241553\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how this vulnerability might be exploited. This example assumes that the attacker is trying to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-57285-critical-command-injection-vulnerability-in-codeceptjs-3-7-3\/\"  data-wpil-monitor-id=\"88129\">inject malicious SQL commands<\/a> via a web form:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/pgscore\/login HTTP\/1.1\nHost: vulnerablewebsite.com\nContent-Type: application\/x-www-form-urlencoded\nusername=admin&#039;--&amp;password=irrelevant<\/code><\/pre>\n<p>In this example, the username field includes a SQL comment (&#8211;). This effectively comments out the rest of the SQL query, allowing the attacker to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54738-authenticate-bypass-vulnerability-in-nootheme-jobmonster\/\"  data-wpil-monitor-id=\"88325\">bypass authentication<\/a>, assuming the application concatenates this input into a SQL query without proper sanitization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The world of cybersecurity is rife with threats, and the Common Vulnerabilities and Exposures (CVE) system is instrumental in indexing these threats. This blog post focuses on a specific vulnerability, CVE-2025-60118, a significant security threat that affects Potenzaglobalsolutions PGS Core. This vulnerability is a classic SQL Injection issue, a type of exploit that targets [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[75,74],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-80811","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-authentication-bypass","attack_vector-sql-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/80811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=80811"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/80811\/revisions"}],"predecessor-version":[{"id":81460,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/80811\/revisions\/81460"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=80811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=80811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=80811"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=80811"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=80811"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=80811"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=80811"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=80811"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=80811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}