{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-58307","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-11T11:49:20.718Z","datePublished":"2025-12-11T21:41:54.372Z","dateUpdated":"2026-04-07T14:08:50.847Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"CSZCMS","vendor":"cszcms","versions":[{"status":"affected","version":"1.3.0"}]}],"credits":[{"lang":"en","type":"finder","value":"Abdulaziz Almetairy"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>CSZCMS 1.3.0 contains an authenticated SQL injection vulnerability in the members view functionality that allows authenticated attackers to manipulate database queries. Attackers can inject malicious SQL code through the view parameter to potentially execute time-based blind SQL injection attacks and extract database information.</p>"}],"value":"CSZCMS 1.3.0 contains an authenticated SQL injection vulnerability in the members view functionality that allows authenticated attackers to manipulate database queries. Attackers can inject malicious SQL code through the view parameter to potentially execute time-based blind SQL injection attacks and extract database information."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:08:50.847Z"},"references":[{"name":"ExploitDB-51916","tags":["exploit"],"url":"https://www.exploit-db.com/exploits/51916"},{"name":"CSZCMS Homepage","tags":["product"],"url":"https://www.cszcms.com/"},{"name":"CSZCMS Download Page","tags":["product"],"url":"https://sourceforge.net/projects/cszcms/files/install/CSZCMS-V1.3.0.zip/download"},{"name":"VulnCheck Advisory: CSZCMS 1.3.0 Authenticated SQL Injection via Members View Endpoint","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/cszcms-authenticated-sql-injection-via-members-view-endpoint"}],"source":{"discovery":"UNKNOWN"},"title":"CSZCMS 1.3.0 Authenticated SQL Injection via Members View Endpoint","x_generator":{"engine":"vulncheck"},"datePublic":"2024-03-20T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-18T21:37:06.401242Z","id":"CVE-2024-58307","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-18T21:37:15.669Z"}}]}}