SQL injection in Sergestec's Exito v8.0. This vulnerability allows an attacker to retrieve, create, update, and delete databases through the 'cat' parameter in '/public.php'.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sergestec-products | Third Party Advisory |
Configurations
History
21 Oct 2025, 13:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:sergestec:exito:8.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sergestec-products - Third Party Advisory | |
| First Time |
Sergestec
Sergestec exito |
16 Oct 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-16 08:15
Updated : 2025-10-21 13:12
NVD link : CVE-2025-41018
Mitre link : CVE-2025-41018
CVE.ORG link : CVE-2025-41018
JSON object : View
Products Affected
sergestec
- exito
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
