An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function.

Project Subscriptions

Vendors Products
Cloudlog Subscribe
Cloudlog Subscribe
Magicbug Subscribe
Cloudlog Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Magicbug
Magicbug cloudlog
CPEs cpe:2.3:a:magicbug:cloudlog:*:*:*:*:*:*:*:*
Vendors & Products Magicbug
Magicbug cloudlog

Sun, 16 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 15 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Cloudlog
Cloudlog cloudlog
Vendors & Products Cloudlog
Cloudlog cloudlog

Fri, 14 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 14 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
Description An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-16T21:03:47.185Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-64084

cve-icon Vulnrichment

Updated: 2025-11-14T21:33:49.053Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-14T21:15:45.367

Modified: 2025-11-19T18:50:31.280

Link: CVE-2025-64084

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-15T21:25:23Z

Weaknesses