A vulnerability was found in zj1983 zz up to 2024-8 and classified as critical. Affected by this issue is the function getUserOrgForUserId of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument userID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md | Exploit Third Party Advisory |
https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.298094 | Permissions Required VDB Entry |
https://vuldb.com/?id.298094 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.504537 | Third Party Advisory VDB Entry |
Configurations
History
26 May 2025, 01:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:* | |
CWE | CWE-89 | |
First Time |
Zframeworks
Zframeworks zz |
|
References | () https://vuldb.com/?submit.504537 - Third Party Advisory, VDB Entry | |
References | () https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?id.298094 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?ctiid.298094 - Permissions Required, VDB Entry |
03 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-74 |
02 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-02 19:15
Updated : 2025-05-26 01:41
NVD link : CVE-2025-1821
Mitre link : CVE-2025-1821
JSON object : View
Products Affected
zframeworks
- zz
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')