Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-27298

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-01 Mar, 2024 | 17:48
Updated At-22 Aug, 2024 | 18:28
Rejected At-
Credits

Parse Server literalizeRegexPart SQL Injection

parse-server is a Parse Server for Node.js / Express. This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database. The vulnerability has been fixed in 6.5.0 and 7.0.0-alpha.20.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:01 Mar, 2024 | 17:48
Updated At:22 Aug, 2024 | 18:28
Rejected At:
â–¼CVE Numbering Authority (CNA)
Parse Server literalizeRegexPart SQL Injection

parse-server is a Parse Server for Node.js / Express. This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database. The vulnerability has been fixed in 6.5.0 and 7.0.0-alpha.20.

Affected Products
Vendor
parse-community
Product
parse-server
Versions
Affected
  • < 6.5.0
  • >= 7.0.0-alpha.1, < 7.0.0-alpha.20
Problem Types
TypeCWE IDDescription
CWECWE-89CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Type: CWE
CWE ID: CWE-89
Description: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Metrics
VersionBase scoreBase severityVector
3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Version: 3.1
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
x_refsource_CONFIRM
https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
x_refsource_MISC
https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
x_refsource_MISC
https://github.com/parse-community/parse-server/releases/tag/6.5.0
x_refsource_MISC
https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
Resource:
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
Resource:
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/6.5.0
Resource:
x_refsource_MISC
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
Resource:
x_refsource_MISC
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
x_refsource_CONFIRM
x_transferred
https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
x_refsource_MISC
x_transferred
https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
x_refsource_MISC
x_transferred
https://github.com/parse-community/parse-server/releases/tag/6.5.0
x_refsource_MISC
x_transferred
https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/6.5.0
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
parseplatform
Product
parse-server
CPEs
  • cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 6.5.0 (custom)
  • From 7.0.0-alpha.1 before 7.0.0-alpha.20 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:01 Mar, 2024 | 18:15
Updated At:03 Dec, 2025 | 20:52

parse-server is a Parse Server for Node.js / Express. This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database. The vulnerability has been fixed in 6.5.0 and 7.0.0-alpha.20.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
CPE Matches

parseplatform
parseplatform
>>parse-server>>Versions before 6.5.0(exclusive)
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>6.5.0
cpe:2.3:a:parseplatform:parse-server:6.5.0:alpha1:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>6.5.0
cpe:2.3:a:parseplatform:parse-server:6.5.0:alpha2:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>6.5.0
cpe:2.3:a:parseplatform:parse-server:6.5.0:beta1:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha1:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha10:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha11:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha12:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha13:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha14:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha15:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha16:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha17:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha18:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha19:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha2:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha3:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha4:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha5:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha6:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha7:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha8:*:*:*:node.js:*:*
parseplatform
parseplatform
>>parse-server>>7.0.0
cpe:2.3:a:parseplatform:parse-server:7.0.0:alpha9:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-89Secondarysecurity-advisories@github.com
CWE ID: CWE-89
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504security-advisories@github.com
Patch
https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833security-advisories@github.com
Patch
https://github.com/parse-community/parse-server/releases/tag/6.5.0security-advisories@github.com
Release Notes
https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20security-advisories@github.com
Release Notes
https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2security-advisories@github.com
Vendor Advisory
https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/parse-community/parse-server/releases/tag/6.5.0af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/6.5.0
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
Source: security-advisories@github.com
Resource:
Vendor Advisory
Hyperlink: https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/6.5.0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2026-33539
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.07% / 20.04%
||
7 Day CHG+0.01%
Published-24 Mar, 2026 | 18:26
Updated-26 Mar, 2026 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parse Server: SQL injection via aggregate and distinct field names in PostgreSQL adapter

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.59 and 9.6.0-alpha.53, an attacker with master key access can execute arbitrary SQL statements on the PostgreSQL database by injecting SQL metacharacters into field name parameters of the aggregate $group pipeline stage or the distinct operation. This allows privilege escalation from Parse Server application-level administrator to PostgreSQL database-level access. Only Parse Server deployments using PostgreSQL are affected. MongoDB deployments are not affected. This issue has been patched in versions 8.6.59 and 9.6.0-alpha.53.

Action-Not Available
Vendor-parseplatformparse-community
Product-parse-serverparse-server
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-32234
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 12.57%
||
7 Day CHG~0.00%
Published-11 Mar, 2026 | 19:58
Updated-13 Mar, 2026 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parse Server has a SQL injection via query field name when using PostgreSQL

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.10 and 8.6.36, an attacker with access to the master key can inject malicious SQL via crafted field names used in query constraints when Parse Server is configured with PostgreSQL as the database. The field name in a $regex query operator is passed to PostgreSQL using unparameterized string interpolation, allowing the attacker to manipulate the SQL query. While the master key controls what can be done through the Parse Server abstraction layer, this SQL injection bypasses Parse Server entirely and operates at the database level. This vulnerability only affects Parse Server deployments using PostgreSQL. This vulnerability is fixed in 9.6.0-alpha.10 and 8.6.36.

Action-Not Available
Vendor-parseplatformparse-community
Product-parse-serverparse-server
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-31871
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 12.28%
||
7 Day CHG~0.00%
Published-11 Mar, 2026 | 18:01
Updated-13 Mar, 2026 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parse Server has a SQL Injection via dot-notation sub-key name in `Increment` operation on PostgreSQL

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.5 and 8.6.31, a SQL injection vulnerability exists in the PostgreSQL storage adapter when processing Increment operations on nested object fields using dot notation (e.g., stats.counter). The sub-key name is interpolated directly into SQL string literals without escaping. An attacker who can send write requests to the Parse Server REST API can inject arbitrary SQL via a crafted sub-key name containing single quotes, potentially executing commands or reading data from the database, bypassing CLPs and ACLs. Only Postgres deployments are affected. This vulnerability is fixed in 9.6.0-alpha.5 and 8.6.31.

Action-Not Available
Vendor-parseplatformparse-community
Product-parse-serverparse-server
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-31856
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 12.28%
||
7 Day CHG~0.00%
Published-11 Mar, 2026 | 17:14
Updated-13 Mar, 2026 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parse Server has a SQL injection via `Increment` operation on nested object field in PostgreSQL

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A SQL injection vulnerability exists in the PostgreSQL storage adapter when processing Increment operations on nested object fields using dot notation (e.g., stats.counter). The amount value is interpolated directly into the SQL query without parameterization or type validation. An attacker who can send write requests to the Parse Server REST API can inject arbitrary SQL subqueries to read any data from the database, bypassing CLPs and ACLs. MongoDB deployments are not affected. This vulnerability is fixed in 9.6.0-alpha.3 and 8.6.29.

Action-Not Available
Vendor-parseplatformparse-community
Product-parse-serverparse-server
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2026-31840
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.07% / 21.12%
||
7 Day CHG~0.00%
Published-11 Mar, 2026 | 16:53
Updated-13 Mar, 2026 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parse Server has a SQL injection via dot-notation field name in PostgreSQL

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.2 and 8.6.28, an attacker can use a dot-notation field name in combination with the sort query parameter to inject SQL into the PostgreSQL database through an improper escaping of sub-field values in dot-notation queries. The vulnerability may also affect queries that use dot-notation field names with the distinct and where query parameters. This vulnerability only affects deployments using a PostgreSQL database. This vulnerability is fixed in 9.6.0-alpha.2 and 8.6.28.

Action-Not Available
Vendor-parseplatformparse-community
Product-parse-serverparse-server
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2024-39309
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.79% / 88.11%
||
7 Day CHG~0.00%
Published-01 Jul, 2024 | 21:15
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.

Action-Not Available
Vendor-parse-communityparse_community
Product-parse-serverparse_server
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2020-7356
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-10||CRITICAL
EPSS-61.51% / 98.34%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 15:45
Updated-17 Sep, 2024 | 03:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cayin xPost SQL Injection

CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.

Action-Not Available
Vendor-CAYIN Technology Co.
Product-xpostCayin xPost
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2019-7003
Matching Score-4
Assigner-Avaya, Inc.
ShareView Details
Matching Score-4
Assigner-Avaya, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.63% / 70.34%
||
7 Day CHG~0.00%
Published-11 Jul, 2019 | 18:37
Updated-17 Sep, 2024 | 00:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ACM SQL Injection

A SQL injection vulnerability in the reporting component of Avaya Control Manager could allow an unauthenticated attacker to execute arbitrary SQL commands and retrieve sensitive data related to other users on the system. Affected versions of Avaya Control Manager include 7.x and 8.0.x versions prior to 8.0.4.0. Unsupported versions not listed here were not evaluated.

Action-Not Available
Vendor-Avaya LLC
Product-control_managerAvaya Control Manager
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-63531
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||CRITICAL
EPSS-0.20% / 42.47%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 00:00
Updated-02 Dec, 2025 | 03:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A SQL injection vulnerability exists in the Blood Bank Management System 1.0 within the receiverLogin.php component. The application fails to properly sanitize user-supplied input in SQL queries, allowing an attacker to inject arbitrary SQL code. By manipulating the remail and rpassword fields, an attacker can bypass authentication and gain unauthorized access to the system.

Action-Not Available
Vendor-shridharshukln/a
Product-blood_bank_management_systemn/a
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2023-28849
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-1.07% / 77.79%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 17:41
Updated-10 Feb, 2025 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GLPI vulnerable to SQL injection and Stored XSS via inventory agent request

GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory.

Action-Not Available
Vendor-GLPI Project
Product-glpiglpi
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Details not found