Description
A vulnerability was identified in code-projects Online Complaint Site 1.0. This impacts an unknown function of the file /admin/category.php. Such manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Published: 2025-10-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Complaint Site
CPEs cpe:2.3:a:fabianros:online_complaint_site:1.0:*:*:*:*:*:*:* cpe:2.3:a:fabian:online_complaint_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros online Complaint Site
Fabian
Fabian online Complaint Site

Mon, 20 Oct 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabianros
Fabianros online Complaint Site
CPEs cpe:2.3:a:fabianros:online_complaint_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabianros
Fabianros online Complaint Site

Fri, 10 Oct 2025 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Complaint Site
Vendors & Products Code-projects
Code-projects online Complaint Site

Thu, 09 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Online Complaint Site 1.0. This impacts an unknown function of the file /admin/category.php. Such manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title code-projects Online Complaint Site category.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Complaint Site
Fabian Online Complaint Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-10-09T19:17:07.957Z

Reserved: 2025-10-09T11:45:50.526Z

Link: CVE-2025-11552

cve-icon Vulnrichment

Updated: 2025-10-09T19:17:04.040Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-09T19:15:42.770

Modified: 2025-10-23T20:06:00.793

Link: CVE-2025-11552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-10T11:17:36Z

Weaknesses