| CVE ID | CVE-2026-4901 |
| Publication date | 09 April 2026 |
| Vendor | Hydrosystem |
| Product | Control System |
| Vulnerable versions | All before 9.8.5 |
| Vulnerability type (CWE) | Insertion of Sensitive Information into Log File (CWE-532) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-34184 |
| Publication date | 09 April 2026 |
| Vendor | Hydrosystem |
| Product | Control System |
| Vulnerable versions | All before 9.8.5 |
| Vulnerability type (CWE) | Missing Authorization (CWE-862) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-34185 |
| Publication date | 09 April 2026 |
| Vendor | Hydrosystem |
| Product | Control System |
| Vulnerable versions | All before 9.8.5 |
| Vulnerability type (CWE) | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in Hydrosystem Control System software and participated in coordination of their disclosure.
The vulnerability CVE-2026-4901: Hydrosystem Control System saves sensitive information into a log file. Critically, user credentials are logged allowing the attacker to obtain further authorized access into the system. Combined with vulnerability CVE-2026-34184, these sensitive information could be accessed by an unauthorized user.
The vulnerability CVE-2026-34184: Hydrosystem Control System does not enforce authorization for some directories. This allows an unauthorized attacker to read all files in these directories and even execute some of them. Critically the attacker could run PHP scripts directly on the connected database.
The vulnerability CVE-2026-34185: Hydrosystem Control System is vulnerable to SQL Injection across most scripts and input parameters. Because no protections are in place, an authenticated attacker can inject arbitrary SQL commands, potentially gaining full control over the database.
These issues were fixed in version 9.8.5
Credits
We thank Jarosław "Jahrek" Kamiński from Securitum for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.