projectworlds Online Examination System 1.0 /inser_doc_process.php Doc_ID SQL Injection
Gaskiya vulnerability da aka ware a matsayin kura an samu a projectworlds Online Examination System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /inser_doc_process.php, a cikin sashen $software_component. A sa manipulation of the argument Doc_ID ka SQL Injection. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-89. Hakika, rauni an bayyana shi 04/28/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-4034. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
2 Goyarwa · 97 Datenpunkte
| Furɗe | Súgá 04/28/2025 08:04 | Gargadi 1/1 05/10/2025 08:41 |
|---|---|---|
| software_vendor | projectworlds | projectworlds |
| software_name | Online Examination System | Online Examination System |
| software_version | 1.0 | 1.0 |
| software_file | /inser_doc_process.php | /inser_doc_process.php |
| software_argument | Doc_ID | Doc_ID |
| vulnerability_cwe | CWE-89 (SQL Injection) | CWE-89 (SQL Injection) |
| vulnerability_risk | 2 | 2 |
| cvss3_vuldb_av | N | N |
| cvss3_vuldb_ac | L | L |
| cvss3_vuldb_pr | N | N |
| cvss3_vuldb_ui | N | N |
| cvss3_vuldb_s | U | U |
| cvss3_vuldb_c | L | L |
| cvss3_vuldb_i | L | L |
| cvss3_vuldb_a | L | L |
| cvss3_vuldb_e | P | P |
| cvss3_vuldb_rc | R | R |
| advisory_url | https://github.com/hhhanxx/attack/issues/1 | https://github.com/hhhanxx/attack/issues/1 |
| exploit_availability | 1 | 1 |
| exploit_publicity | 1 | 1 |
| exploit_url | https://github.com/hhhanxx/attack/issues/1 | https://github.com/hhhanxx/attack/issues/1 |
| source_cve | CVE-2025-4034 | CVE-2025-4034 |
| cna_responsible | VulDB | VulDB |
| software_type | Project Management Software | Project Management Software |
| cvss2_vuldb_av | N | N |
| cvss2_vuldb_ac | L | L |
| cvss2_vuldb_au | N | N |
| cvss2_vuldb_ci | P | P |
| cvss2_vuldb_ii | P | P |
| cvss2_vuldb_ai | P | P |
| cvss2_vuldb_e | POC | POC |
| cvss2_vuldb_rc | UR | UR |
| cvss4_vuldb_av | N | N |
| cvss4_vuldb_ac | L | L |
| cvss4_vuldb_pr | N | N |
| cvss4_vuldb_ui | N | N |
| cvss4_vuldb_vc | L | L |
| cvss4_vuldb_vi | L | L |
| cvss4_vuldb_va | L | L |
| cvss4_vuldb_e | P | P |
| cvss2_vuldb_rl | ND | ND |
| cvss3_vuldb_rl | X | X |
| cvss4_vuldb_at | N | N |
| cvss4_vuldb_sc | N | N |
| cvss4_vuldb_si | N | N |
| cvss4_vuldb_sa | N | N |
| cvss2_vuldb_basescore | 7.5 | 7.5 |
| cvss2_vuldb_tempscore | 6.4 | 6.4 |
| cvss3_vuldb_basescore | 7.3 | 7.3 |
| cvss3_vuldb_tempscore | 6.6 | 6.6 |
| cvss3_meta_basescore | 7.3 | 8.1 |
| cvss3_meta_tempscore | 6.6 | 7.9 |
| cvss4_vuldb_bscore | 6.9 | 6.9 |
| cvss4_vuldb_btscore | 5.5 | 5.5 |
| advisory_date | 1745791200 (04/28/2025) | 1745791200 (04/28/2025) |
| price_0day | $0-$5k | $0-$5k |
| cve_nvd_summary | A vulnerability classified as critical was found in projectworlds Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /inser_doc_process.php. The manipulation of the argument Doc_ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | |
| cve_nvd_summaryes | Se encontró una vulnerabilidad crítica en projectworlds Online Examination System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /inser_doc_process.php. La manipulación del argumento Doc_ID provoca una inyección SQL. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. | |
| cvss4_cna_av | N | |
| cvss4_cna_ac | L | |
| cvss4_cna_at | N | |
| cvss4_cna_pr | N | |
| cvss4_cna_ui | N | |
| cvss4_cna_vc | L | |
| cvss4_cna_vi | L | |
| cvss4_cna_va | L | |
| cvss4_cna_sc | N | |
| cvss4_cna_si | N | |
| cvss4_cna_sa | N | |
| cvss4_cna_bscore | 6.9 | |
| cvss3_cna_av | N | |
| cvss3_cna_ac | L | |
| cvss3_cna_pr | N | |
| cvss3_cna_ui | N | |
| cvss3_cna_s | U | |
| cvss3_cna_c | L | |
| cvss3_cna_i | L | |
| cvss3_cna_a | L | |
| cvss3_cna_basescore | 7.3 | |
| cvss3_nvd_av | N | |
| cvss3_nvd_ac | L | |
| cvss3_nvd_pr | N | |
| cvss3_nvd_ui | N | |
| cvss3_nvd_s | U | |
| cvss3_nvd_c | H | |
| cvss3_nvd_i | H | |
| cvss3_nvd_a | H | |
| cvss3_nvd_basescore | 9.8 | |
| cvss2_cna_av | N | |
| cvss2_cna_ac | L | |
| cvss2_cna_au | N | |
| cvss2_cna_ci | P | |
| cvss2_cna_ii | P | |
| cvss2_cna_ai | P | |
| cvss2_cna_basescore | 7.5 |