CVE-2025-0406

A vulnerability was found in liujianview gymxmjpa 1.0. It has been classified as critical. Affected is the function SubjectDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/SubjectController.java. The manipulation of the argument subname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/liujianview/gymxmjpa/issues/5 Exploit Third Party Advisory
https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069 Exploit Third Party Advisory
https://vuldb.com/?ctiid.291282 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.291282 Third Party Advisory VDB Entry
https://vuldb.com/?submit.473417 Third Party Advisory VDB Entry
https://github.com/liujianview/gymxmjpa/issues/5 Exploit Third Party Advisory
https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*

History

05 May 2025, 15:20

Type Values Removed Values Added
CPE cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*
First Time Liujianview gymxmjpa
Liujianview
References () https://github.com/liujianview/gymxmjpa/issues/5 - () https://github.com/liujianview/gymxmjpa/issues/5 - Exploit, Third Party Advisory
References () https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069 - () https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.291282 - () https://vuldb.com/?ctiid.291282 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.291282 - () https://vuldb.com/?id.291282 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.473417 - () https://vuldb.com/?submit.473417 - Third Party Advisory, VDB Entry

13 Jan 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en liujianview gymxmjpa 1.0. Se ha clasificado como crítica. La función SubjectDaoImpl del archivo src/main/java/com/liujian/gymxmjpa/controller/SubjectController.java está afectada. La manipulación del argumento subname provoca una inyección SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse.
References () https://github.com/liujianview/gymxmjpa/issues/5 - () https://github.com/liujianview/gymxmjpa/issues/5 -
References () https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069 - () https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069 -

13 Jan 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-13 02:15

Updated : 2025-05-05 15:20


NVD link : CVE-2025-0406

Mitre link : CVE-2025-0406

CVE.ORG link : CVE-2025-0406


JSON object : View

Products Affected

liujianview

  • gymxmjpa
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')