diff --git a/2025/5xxx/CVE-2025-5155.json b/2025/5xxx/CVE-2025-5155.json index 87075c9336f..0657de122d0 100644 --- a/2025/5xxx/CVE-2025-5155.json +++ b/2025/5xxx/CVE-2025-5155.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-5155", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in qianfox FoxCMS 1.2.5 and classified as critical. Affected by this vulnerability is the function batchCope of the file app/admin/controller/Article.php. The manipulation of the argument ids leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In qianfox FoxCMS 1.2.5 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion batchCope der Datei app/admin/controller/Article.php. Durch Beeinflussen des Arguments ids mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "qianfox", + "product": { + "product_data": [ + { + "product_name": "FoxCMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.2.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.310243", + "refsource": "MISC", + "name": "https://vuldb.com/?id.310243" + }, + { + "url": "https://vuldb.com/?ctiid.310243", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.310243" + }, + { + "url": "https://vuldb.com/?submit.576286", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.576286" + }, + { + "url": "https://github.com/xiaoyangsec/foxcms_sql_injection/blob/main/foxcms_sql_injection.md", + "refsource": "MISC", + "name": "https://github.com/xiaoyangsec/foxcms_sql_injection/blob/main/foxcms_sql_injection.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "xiaoyang (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] }