[+] Credits: Shahnawaz Shaikh, Security Researcher at Cybergate Defense LLC
[+] [+] Credits: Shahnawaz Shaikh, Security Researcher at Cybergate Defense LLC
[+] twitter.com/_striv3r_
[Vendor of Product]
RSI Queue (https://www.rsiqueue.com/)
[Vulnerability Type]
Blind SQL Injection
[Affected Component]
The vulnerable component is the TaskID parameter in the get request.
[CVE Reference]
CVE-2025-26086
[Security Issue]
An unauthenticated blind SQL injection vulnerability exists in RSI Queue
Management System v3.0 within the TaskID parameter of the get request
handler. Attackers can remotely inject time-delayed SQL payloads to induce
server response delays, enabling time-based inference and iterative
extraction of sensitive database contents without authentication.
[Attack Vectors]
An attacker sends malicious SQL payloads in the TaskID parameter to trigger
time delays. The server executes these queries, and the response time
reveals boolean results, enabling iterative database enumeration.
[Network Access]
Remote
[Severity]
Critical
[Disclosure Timeline]
Vendor Notification: October 16, 2024
Vendor released fixed: May 2, 2025
RSI Queue Management System 3.0 SQL Injection
- Details
- Written by: khalil shreateh
- Category: Vulnerabilities
- Hits: 48