{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50694","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-21T19:48:13.436Z","datePublished":"2025-12-30T22:41:34.373Z","dateUpdated":"2026-02-18T21:20:53.446Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-01-16T18:59:58.958Z"},"datePublic":"2022-12-14T00:00:00.000Z","title":"SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x SQL Injection via Username Parameter","descriptions":[{"lang":"en","value":"SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x contains an SQL injection vulnerability in the 'username' POST parameter of index.php that allows attackers to manipulate database queries. Attackers can inject arbitrary SQL code through the username parameter to bypass authentication and potentially access unauthorized database information."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","cweId":"CWE-89","type":"CWE"}]}],"affected":[{"vendor":"SOUND4 Ltd.","product":"Impact/Pulse/First","versions":[{"version":"Version 2: 1.1/2.15","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"Impact/Pulse Eco","versions":[{"version":"1.16","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"BigVoice4","versions":[{"version":"1.2","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"BigVoice2","versions":[{"version":"1.30","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"Stream","versions":[{"version":"1.1/2.4.29","status":"affected"}]},{"vendor":"Kantar Media","product":"WM2","versions":[{"version":"1.11","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.8,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5727.php","name":"Zero Science Lab Disclosure (ZSL-2022-5727)","tags":["third-party-advisory"]},{"url":"https://packetstormsecurity.com/files/170254/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-username-SQL-Injection.html","name":"Packet Storm Security Exploit Details","tags":["exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/247947","name":"IBM X-Force Vulnerability Exchange Entry","tags":["vdb-entry"]},{"url":"https://www.sound4.com/","name":"SOUND4 Product Homepage","tags":["product"]},{"name":"VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x SQL Injection via Username Parameter","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-sql-injection-via-username-parameter"}],"credits":[{"lang":"en","value":"LiquidWorm as Gjoko Krstic of Zero Science Lab","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-18T21:20:47.891825Z","id":"CVE-2022-50694","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-18T21:20:53.446Z"}}]}}