A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-3065 | A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/emoncms/emoncms/issues/1916 |
|
History
Wed, 30 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openenergymonitor
Openenergymonitor emoncms |
|
| CPEs | cpe:2.3:a:openenergymonitor:emoncms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openenergymonitor
Openenergymonitor emoncms |
Thu, 06 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 06 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-06T20:53:20.554Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2025-22992
Updated: 2025-02-06T20:40:06.839Z
Status : Analyzed
Published: 2025-02-06T19:15:19.970
Modified: 2025-07-30T18:12:48.717
Link: CVE-2025-22992
No data.
OpenCVE Enrichment
No data.
EUVD