SQL Injection vulnerability exists in Tirreno v0.9.5, specifically in the /admin/loadUsers API endpoint. The vulnerability arises due to unsafe handling of user-supplied input in the columns[0][data] parameter, which is directly used in SQL queries without proper validation or parameterization.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 | |
Metrics |
cvssV3_1
|
Tue, 02 Sep 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SQL Injection vulnerability exists in Tirreno v0.9.5, specifically in the /admin/loadUsers API endpoint. The vulnerability arises due to unsafe handling of user-supplied input in the columns[0][data] parameter, which is directly used in SQL queries without proper validation or parameterization. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-02T19:49:38.327Z
Reserved: 2025-08-13T00:00:00.000Z
Link: CVE-2025-55472

Updated: 2025-09-02T19:49:33.847Z

Status : Received
Published: 2025-09-02T17:15:35.950
Modified: 2025-09-02T20:15:35.320
Link: CVE-2025-55472

No data.

No data.