A vulnerability, which was classified as critical, was found in code-projects Inventory Management System 1.0. This affects an unknown part of the file /php_action/createCategories.php. The manipulation of the argument categoriesStatus leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/mex135605/cve/issues/2 | Exploit Issue Tracking Third Party Advisory |
https://github.com/mex135605/cve/issues/2 | Exploit Issue Tracking Third Party Advisory |
https://vuldb.com/?ctiid.313617 | Permissions Required VDB Entry |
https://vuldb.com/?id.313617 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.601251 | Third Party Advisory VDB Entry |
Configurations
History
27 Jun 2025, 16:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://code-projects.org/ - Product | |
References | () https://vuldb.com/?ctiid.313617 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.313617 - Third Party Advisory, VDB Entry | |
References | () https://github.com/mex135605/cve/issues/2 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://vuldb.com/?submit.601251 - Third Party Advisory, VDB Entry | |
First Time |
Code-projects inventory Management System
Code-projects |
|
CPE | cpe:2.3:a:code-projects:inventory_management_system:1.0:*:*:*:*:*:*:* | |
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
23 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
23 Jun 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-23 03:15
Updated : 2025-06-27 16:57
NVD link : CVE-2025-6501
Mitre link : CVE-2025-6501
JSON object : View
Products Affected
code-projects
- inventory_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')