{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-10387","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-13T09:37:08.368Z","datePublished":"2025-09-14T03:02:05.743Z","dateUpdated":"2025-09-15T15:46:48.506Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-14T03:02:05.743Z"},"title":"codesiddhant Jasmin Ransomware handshake.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"codesiddhant","product":"Jasmin Ransomware","versions":[{"version":"1.0.0","status":"affected"},{"version":"1.0.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in codesiddhant Jasmin Ransomware up to 1.0.1. This vulnerability affects unknown code of the file /handshake.php. This manipulation of the argument machine_name/computer_user/os/date/time/ip/location/systemid/password causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In codesiddhant Jasmin Ransomware bis 1.0.1 wurde eine Schwachstelle gefunden. Dies betrifft einen unbekannten Teil der Datei /handshake.php. Mit der Manipulation des Arguments machine_name/computer_user/os/date/time/ip/location/systemid/password mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-13T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-13T11:42:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"f10w3r (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.323822","name":"VDB-323822 | codesiddhant Jasmin Ransomware handshake.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.323822","name":"VDB-323822 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.644285","name":"Submit #644285 | codesiddhant Jasmin-Ransomware 1.0.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_handshake.php.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_handshake.php.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-15T15:46:45.496335Z","id":"CVE-2025-10387","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-15T15:46:48.506Z"}}]}}