A vulnerability classified as critical has been found in SourceCodester PHP Display Username After Login 1.0. Affected is an unknown function of the file /login.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/shanranne/myCVE/issues/2 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/shanranne/myCVE/issues/2 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.310662 | Permissions Required VDB Entry |
| https://vuldb.com/?id.310662 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.587234 | Third Party Advisory VDB Entry |
| https://www.sourcecodester.com/ | Product |
Configurations
History
09 Jun 2025, 18:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://vuldb.com/?submit.587234 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?ctiid.310662 - Permissions Required, VDB Entry | |
| References | () https://www.sourcecodester.com/ - Product | |
| References | () https://vuldb.com/?id.310662 - Third Party Advisory, VDB Entry | |
| References | () https://github.com/shanranne/myCVE/issues/2 - Exploit, Issue Tracking, Third Party Advisory | |
| First Time |
Razormist display Username After Login
Razormist |
|
| CWE | CWE-89 | |
| CPE | cpe:2.3:a:razormist:display_username_after_login:1.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
02 Jun 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-74 |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
31 May 2025, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-31 05:15
Updated : 2025-06-09 18:59
NVD link : CVE-2025-5369
Mitre link : CVE-2025-5369
JSON object : View
Products Affected
razormist
- display_username_after_login
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
