An authenticated SQL injection vulnerability in VX Guestbook 1.07 allows attackers with admin access to inject malicious SQL payloads via the "word" POST parameter in the words.php admin panel.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://packetstorm.news/files/id/207781/ |
|
History
Thu, 18 Sep 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpversion
Phpversion vx Guestbook |
|
| CPEs | cpe:2.3:a:phpversion:vx_guestbook:1.07:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpversion
Phpversion vx Guestbook |
Thu, 04 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 04 Sep 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated SQL injection vulnerability in VX Guestbook 1.07 allows attackers with admin access to inject malicious SQL payloads via the "word" POST parameter in the words.php admin panel. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-09-04T00:00:00.000Z
Updated: 2025-09-04T15:04:26.190Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57263
Updated: 2025-09-04T15:04:20.002Z
Status : Analyzed
Published: 2025-09-04T14:15:46.130
Modified: 2025-09-18T16:51:13.593
Link: CVE-2025-57263
No data.
ReportizFlow