Description
A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-3065 | A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions. |
References
| Link | Providers |
|---|---|
| https://github.com/emoncms/emoncms/issues/1916 |
|
History
Wed, 30 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openenergymonitor
Openenergymonitor emoncms |
|
| CPEs | cpe:2.3:a:openenergymonitor:emoncms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openenergymonitor
Openenergymonitor emoncms |
Thu, 06 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 06 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-06T20:53:20.554Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2025-22992
Updated: 2025-02-06T20:40:06.839Z
Status : Analyzed
Published: 2025-02-06T19:15:19.970
Modified: 2025-07-30T18:12:48.717
Link: CVE-2025-22992
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD