CVE-2025-3245

A vulnerability was found in itsourcecode Library Management System 1.0. It has been rated as critical. Affected by this issue is the function Search of the file library_management/src/Library_Management/Forgot.java. The manipulation of the argument txtuname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/wlingze/IRify_scan/issues/1 Exploit Issue Tracking Third Party Advisory
https://itsourcecode.com/ Product
https://vuldb.com/?ctiid.303272 Permissions Required VDB Entry
https://vuldb.com/?id.303272 Third Party Advisory VDB Entry
https://vuldb.com/?submit.548087 Exploit Third Party Advisory VDB Entry
https://github.com/wlingze/IRify_scan/issues/1 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:angeljudesuarez:library_management_system:*:*:*:*:*:*:*:*

History

23 Apr 2025, 14:51

Type Values Removed Values Added
CPE cpe:2.3:a:angeljudesuarez:library_management_system:*:*:*:*:*:*:*:*
First Time Angeljudesuarez
Angeljudesuarez library Management System
References () https://github.com/wlingze/IRify_scan/issues/1 - () https://github.com/wlingze/IRify_scan/issues/1 - Exploit, Issue Tracking, Third Party Advisory
References () https://itsourcecode.com/ - () https://itsourcecode.com/ - Product
References () https://vuldb.com/?ctiid.303272 - () https://vuldb.com/?ctiid.303272 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.303272 - () https://vuldb.com/?id.303272 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.548087 - () https://vuldb.com/?submit.548087 - Exploit, Third Party Advisory, VDB Entry

07 Apr 2025, 14:18

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en itsourcecode Library Management System 1.0. Se ha clasificado como crítica. Este problema afecta a la función de búsqueda del archivo library_management/src/Library_Management/Forgot.java. La manipulación del argumento txtuname provoca una inyección SQL. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.

04 Apr 2025, 14:15

Type Values Removed Values Added
References () https://github.com/wlingze/IRify_scan/issues/1 - () https://github.com/wlingze/IRify_scan/issues/1 -

04 Apr 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-04 12:15

Updated : 2025-04-23 14:51


NVD link : CVE-2025-3245

Mitre link : CVE-2025-3245

CVE.ORG link : CVE-2025-3245


JSON object : View

Products Affected

angeljudesuarez

  • library_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')