Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-9749
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-31 Aug, 2025 | 22:32
Updated At-31 Aug, 2025 | 22:32
Rejected At-
▼CVE Numbering Authority (CNA)
HKritesh009 Grocery List Management Web App update.php sql injection

A vulnerability was identified in HKritesh009 Grocery List Management Web App up to f491b681eb70d465f445c9a721415c965190f83b. This affects an unknown part of the file /src/update.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.

Affected Products
Vendor
HKritesh009
Product
Grocery List Management Web App
Versions
Affected
  • f491b681eb70d465f445c9a721415c965190f83b
Problem Types
TypeCWE IDDescription
CWECWE-89SQL Injection
CWECWE-74Injection
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
3.07.3HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
2.07.5N/A
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
0xSebin (VulDB User)
Timeline
EventDate
Advisory disclosed2025-08-31 00:00:00
VulDB entry created2025-08-31 02:00:00
VulDB entry last update2025-08-31 10:17:29
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.322050
vdb-entry
technical-description
https://vuldb.com/?ctiid.322050
signature
permissions-required
https://vuldb.com/?submit.640488
third-party-advisory
https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819
related
https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819#steps-to-reproduce
exploit
Details not found