A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
History

Tue, 25 Feb 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Fabianros
Fabianros chat System
CPEs cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros chat System

Thu, 30 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Chat System addnewmember.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-01-30T21:00:17.251Z

Updated: 2025-01-30T21:17:27.265Z

Reserved: 2025-01-30T15:09:12.891Z

Link: CVE-2025-0882

cve-icon Vulnrichment

Updated: 2025-01-30T21:17:08.088Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-30T21:15:14.820

Modified: 2025-02-25T19:08:48.593

Link: CVE-2025-0882

cve-icon Redhat

No data.