CVE-2025-0174

A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /user/search_result2.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://gist.github.com/Masamuneee/ca3f96ac0ec34bb7c1dd4bfd180f11bb Exploit Third Party Advisory
https://vuldb.com/?ctiid.290103 Permissions Required VDB Entry
https://vuldb.com/?id.290103 Third Party Advisory VDB Entry
https://vuldb.com/?submit.473330 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*

History

25 Feb 2025, 22:42

Type Values Removed Values Added
First Time Code-projects point Of Sales And Inventory Management System
Code-projects
CPE cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://gist.github.com/Masamuneee/ca3f96ac0ec34bb7c1dd4bfd180f11bb - () https://gist.github.com/Masamuneee/ca3f96ac0ec34bb7c1dd4bfd180f11bb - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.290103 - () https://vuldb.com/?ctiid.290103 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.290103 - () https://vuldb.com/?id.290103 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.473330 - () https://vuldb.com/?submit.473330 - Third Party Advisory, VDB Entry

18 Feb 2025, 22:15

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0. Se ha clasificado como crítica. Afecta a una parte desconocida del archivo /user/search_result2.php del componente Parameter Handler. La manipulación del argumento search conduce a una inyección SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.

03 Jan 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-03 01:15

Updated : 2025-02-25 22:42


NVD link : CVE-2025-0174

Mitre link : CVE-2025-0174

CVE.ORG link : CVE-2025-0174


JSON object : View

Products Affected

code-projects

  • point_of_sales_and_inventory_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')