Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-11861 | NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 13 May 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Namelessmc
Namelessmc nameless |
|
| CPEs | cpe:2.3:a:namelessmc:nameless:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Namelessmc
Namelessmc nameless |
|
| Metrics |
cvssV3_1
|
Fri, 18 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 18 Apr 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4. | |
| Title | NamelessMC Vulnerable to SQL Injections in /user/messaging and /panel/users/reports Pages | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-18T16:24:24.300Z
Reserved: 2025-04-06T19:46:02.463Z
Link: CVE-2025-32389
Updated: 2025-04-18T16:15:16.987Z
Status : Analyzed
Published: 2025-04-18T16:15:23.033
Modified: 2025-05-13T15:23:15.957
Link: CVE-2025-32389
No data.
OpenCVE Enrichment
No data.
EUVD