{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-11629","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-11T13:51:03.160Z","datePublished":"2025-10-12T07:02:06.148Z","dateUpdated":"2025-10-15T19:52:15.161Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-12T07:02:06.148Z"},"title":"RainyGao DocSys getUserList.do getUserList sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"RainyGao","product":"DocSys","versions":[{"version":"2.02.0","status":"affected"},{"version":"2.02.1","status":"affected"},{"version":"2.02.2","status":"affected"},{"version":"2.02.3","status":"affected"},{"version":"2.02.4","status":"affected"},{"version":"2.02.5","status":"affected"},{"version":"2.02.6","status":"affected"},{"version":"2.02.7","status":"affected"},{"version":"2.02.8","status":"affected"},{"version":"2.02.9","status":"affected"},{"version":"2.02.10","status":"affected"},{"version":"2.02.11","status":"affected"},{"version":"2.02.12","status":"affected"},{"version":"2.02.13","status":"affected"},{"version":"2.02.14","status":"affected"},{"version":"2.02.15","status":"affected"},{"version":"2.02.16","status":"affected"},{"version":"2.02.17","status":"affected"},{"version":"2.02.18","status":"affected"},{"version":"2.02.19","status":"affected"},{"version":"2.02.20","status":"affected"},{"version":"2.02.21","status":"affected"},{"version":"2.02.22","status":"affected"},{"version":"2.02.23","status":"affected"},{"version":"2.02.24","status":"affected"},{"version":"2.02.25","status":"affected"},{"version":"2.02.26","status":"affected"},{"version":"2.02.27","status":"affected"},{"version":"2.02.28","status":"affected"},{"version":"2.02.29","status":"affected"},{"version":"2.02.30","status":"affected"},{"version":"2.02.31","status":"affected"},{"version":"2.02.32","status":"affected"},{"version":"2.02.33","status":"affected"},{"version":"2.02.34","status":"affected"},{"version":"2.02.35","status":"affected"},{"version":"2.02.36","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in RainyGao DocSys up to 2.02.36. This impacts the function getUserList of the file /Manage/getUserList.do. Such manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in RainyGao DocSys up to 2.02.36 entdeckt. Betroffen hiervon ist die Funktion getUserList der Datei /Manage/getUserList.do. Durch das Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-11T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-11T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-11T15:56:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Tta0 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.328041","name":"VDB-328041 | RainyGao DocSys getUserList.do getUserList sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.328041","name":"VDB-328041 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.664843","name":"Submit #664843 | https://github.com/RainyGao-GitHub/DocSys/ DocSys 2.02.36 SQL injection","tags":["third-party-advisory"]},{"url":"https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/sql%E6%B3%A8%E5%85%A5.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/sql%E6%B3%A8%E5%85%A5.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-15T19:52:12.247988Z","id":"CVE-2025-11629","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-15T19:52:15.161Z"}}]}}