projectworlds Online Lawyer Management System 1.0 save_lawyer_edit_profile.php SQL Injection

Gaskiya vulnerability da aka ware a matsayin kura an samu a projectworlds Online Lawyer Management System 1.0. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /save_lawyer_edit_profile.php, a cikin sashen $software_component. A sa manipulation ka SQL Injection. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-89. Hakika, rauni an bayyana shi 05/18/2025. An raba bayanin tsaro don saukewa a github.com. Wannan matsala ana saninta da CVE-2025-4928. Ngam yiɗi ka a tuma ndiyam ka nder layi. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga github.com. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

2 Goyarwa · 57 Datenpunkte

FurɗeSúgá
05/18/2025 08:42
Gargadi 1/1
05/19/2025 14:28
software_vendorprojectworldsprojectworlds
software_nameOnline Lawyer Management SystemOnline Lawyer Management System
software_version1.01.0
software_file/save_lawyer_edit_profile.php/save_lawyer_edit_profile.php
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/hhhanxx/attack/issues/8https://github.com/hhhanxx/attack/issues/8
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/hhhanxx/attack/issues/8https://github.com/hhhanxx/attack/issues/8
source_cveCVE-2025-4928CVE-2025-4928
cna_responsibleVulDBVulDB
decision_summaryMultiple parameters might be affected.Multiple parameters might be affected.
software_typeProject Management SoftwareProject Management Software
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore7.57.5
cvss2_vuldb_tempscore6.46.4
cvss3_vuldb_basescore7.37.3
cvss3_vuldb_tempscore6.66.6
cvss3_meta_basescore7.37.3
cvss3_meta_tempscore6.66.6
cvss4_vuldb_bscore6.96.9
cvss4_vuldb_btscore5.55.5
advisory_date1747519200 (05/18/2025)1747519200 (05/18/2025)
price_0day$0-$5k$0-$5k
euvd_idEUVD-2025-15693

Do you want to use VulDB in your project?

Use the official API to access entries easily!