Zoho Corporation has released an urgent advisory about a critical SQL injection vulnerability affecting Analytics Plus on-premise installations. Tracked as CVE-2025-8324 with a CVSS score of 9.8, the flaw allows unauthenticated attackers to execute arbitrary SQL queries through improperly validated input. This exposure can lead to significant data compromise, including unauthorized access to user information and potential account takeover. The vulnerability affects all builds below 6170, and Zoho has issued a fix in Build 6171. According to the advisory, the issue stems from insecure handling of user-supplied parameters in specific backend URLs. Because no authentication is required to exploit the flaw, organizations with exposed or incorrectly segmented deployments face heightened risk. Given how SQL injection vulnerabilities are commonly used to extract, modify, or leverage sensitive database content, Zoho stresses that this issue should be treated as a high-priority security concern. Analytics Plus’s widespread use in analytics, BI dashboards, and data processing further increases the potential impact if left unpatched. Zoho urges all on-premise customers to apply the latest update immediately. Remediation involves downloading the newest upgrade pack from the official service pack page and following the provided installation instructions to deploy Build 6171.
A critical security issue in the Marimo Python notebook environment has raised serious alarm in the cybersecurity community due to its ability to enable unauthenticated remote comm...
A sophisticated software supply chain attack targeted the widely used Nx Console extension on the Microsoft Visual Studio Code Marketplace, potentially exposing more than two milli...
Critical security flaws have been discovered in the workflow automation platform n8n, prompting urgent warnings from cybersecurity researchers. The vulnerabilities, tracked as CVE-...