Key Vulnerability Information Application Name: FileFlows Vulnerability Type: SQL Injection Discovery Method: Decompiling .NET Code Vulnerable Endpoint: /api/library-file/search Vulnerable Code Location: DbLibraryFileManager Vulnerable Code Snippet: Vulnerability Details: - The endpoint is vulnerable to SQL injection. - The attacker controls the object, which is used to generate a SQL query. - String concatenation is used to build the SQL query, making it vulnerable to injection. Exploitation Exploit Discoverer: The SQL injection can be exploited in MySQL databases. Exploit Proof-of-Concept (POC): - The POC demonstrates how an attacker can manipulate the field to inject SQL code. - Example payload: Important Notes The SQL injection vulnerability is only exploitable in MySQL. The vulnerability was fixed in FileFlows version 25.05. The CVE identifier for this vulnerability is CVE-2025-15585.