MeterSphere is an open source continuous testing platform. Prior to version 3.6.5-lts, the sortField parameter in certain API endpoints is not properly validated or sanitized. An attacker can supply crafted input to inject and execute arbitrary SQL statements through the sorting functionality. This could result in modification or deletion of database contents, with a potential full compromise of the application’s database integrity and availability. Version 3.6.5-lts fixes the issue.
History

Thu, 11 Sep 2025 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 15 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00047}


Mon, 14 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Description MeterSphere is an open source continuous testing platform. Prior to version 3.6.5-lts, the sortField parameter in certain API endpoints is not properly validated or sanitized. An attacker can supply crafted input to inject and execute arbitrary SQL statements through the sorting functionality. This could result in modification or deletion of database contents, with a potential full compromise of the application’s database integrity and availability. Version 3.6.5-lts fixes the issue.
Title Metersphere has SQL Injection Vulnerability in Sorting Field
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-07-14T20:04:29.479Z

Updated: 2025-07-15T19:50:55.001Z

Reserved: 2025-07-07T14:20:38.390Z

Link: CVE-2025-53639

cve-icon Vulnrichment

Updated: 2025-07-15T13:27:35.281Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-14T20:15:29.487

Modified: 2025-09-11T20:47:39.250

Link: CVE-2025-53639

cve-icon Redhat

No data.