Project Worlds Student Project Allocation System 1.0 forgot_password_sql.php Pat_BloodGroup1 SQL Injection

Gaskiya vulnerability da aka ware a matsayin kura an samu a Project Worlds Student Project Allocation System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /change_pass/forgot_password_sql.php, a cikin sashen $software_component. A sa manipulation of the argument Pat_BloodGroup1 ka SQL Injection. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-89. Hakika, rauni an bayyana shi 05/09/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-4482. Ngam yiɗi ka a tuma ndiyam ka nder internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

1 Goyarwa · 57 Datenpunkte

FurɗeSúgá
05/09/2025 13:51
cvss4_vuldb_vcL
cvss4_vuldb_viL
cvss4_vuldb_vaL
cvss4_vuldb_eP
cvss2_vuldb_rlND
cvss3_vuldb_rlX
cvss4_vuldb_atN
cvss4_vuldb_scN
cvss4_vuldb_siN
cvss4_vuldb_saN
cvss2_vuldb_basescore7.5
cvss2_vuldb_tempscore6.4
cvss3_vuldb_basescore7.3
cvss3_vuldb_tempscore6.6
cvss3_meta_basescore7.3
cvss3_meta_tempscore6.6
cvss4_vuldb_bscore6.9
cvss4_vuldb_btscore5.5
advisory_date1746741600 (05/09/2025)
price_0day$0-$5k
software_vendorProject Worlds
software_nameStudent Project Allocation System
software_version1.0
software_file/change_pass/forgot_password_sql.php
software_argumentPat_BloodGroup1
vulnerability_cweCWE-89 (SQL Injection)
vulnerability_risk2
cvss3_vuldb_avN
cvss3_vuldb_acL
cvss3_vuldb_prN
cvss3_vuldb_uiN
cvss3_vuldb_sU
cvss3_vuldb_cL
cvss3_vuldb_iL
cvss3_vuldb_aL
cvss3_vuldb_eP
cvss3_vuldb_rcR
advisory_urlhttps://github.com/hhhanxx/attack/issues/3
exploit_availability1
exploit_publicity1
exploit_urlhttps://github.com/hhhanxx/attack/issues/3
source_cveCVE-2025-4482
cna_responsibleVulDB
decision_summaryOther parameters might be affected as well.
software_typeProject Management Software
cvss2_vuldb_avN
cvss2_vuldb_acL
cvss2_vuldb_auN
cvss2_vuldb_ciP
cvss2_vuldb_iiP
cvss2_vuldb_aiP
cvss2_vuldb_ePOC
cvss2_vuldb_rcUR
cvss4_vuldb_avN
cvss4_vuldb_acL
cvss4_vuldb_prN
cvss4_vuldb_uiN

Do you want to use VulDB in your project?

Use the official API to access entries easily!