A vulnerability classified as critical has been found in code-projects Chat System 1.0. Affected is an unknown function of the file /user/fetch_member.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/LamentXU123/cve/blob/main/sql_fetch_member.md | Exploit Third Party Advisory |
https://github.com/LamentXU123/cve/blob/main/sql_fetch_member.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.315126 | Permissions Required VDB Entry |
https://vuldb.com/?id.315126 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.607196 | Third Party Advisory VDB Entry |
Configurations
History
11 Jul 2025, 17:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Fabianros chat System
Fabianros |
|
References | () https://vuldb.com/?id.315126 - Third Party Advisory, VDB Entry | |
References | () https://code-projects.org/ - Product | |
References | () https://vuldb.com/?ctiid.315126 - Permissions Required, VDB Entry | |
References | () https://github.com/LamentXU123/cve/blob/main/sql_fetch_member.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?submit.607196 - Third Party Advisory, VDB Entry |
09 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-74 |
08 Jul 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 17:16
Updated : 2025-07-11 17:20
NVD link : CVE-2025-7187
Mitre link : CVE-2025-7187
JSON object : View
Products Affected
fabianros
- chat_system
CWE
No CWE.