{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12929","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-11-09T13:02:00.518Z","datePublished":"2025-11-10T03:32:07.139Z","dateUpdated":"2025-11-10T14:59:47.356Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-11-10T03:32:07.139Z"},"title":"SourceCodester Survey Application System LoginRegistration.php update_user sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Survey Application System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A flaw has been found in SourceCodester Survey Application System 1.0. This impacts the function save_user/update_user of the file /LoginRegistration.php. Executing manipulation of the argument fullname can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. Other parameters might be affected as well."},{"lang":"de","value":"Es wurde eine Schwachstelle in SourceCodester Survey Application System 1.0 entdeckt. Betroffen davon ist die Funktion save_user/update_user der Datei /LoginRegistration.php. Durch die Manipulation des Arguments fullname mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Ausnutzung wurde veröffentlicht und kann verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-11-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-11-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-09T14:07:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"lakshay12311 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.331649","name":"VDB-331649 | SourceCodester Survey Application System LoginRegistration.php update_user sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.331649","name":"VDB-331649 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.681746","name":"Submit #681746 | sourcecodester Survey Application System 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/lakshayyverma/CVE-Discovery/blob/main/Survey%20Application%20System.md","tags":["exploit"]},{"url":"https://www.sourcecodester.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"references":[{"url":"https://github.com/lakshayyverma/CVE-Discovery/blob/main/Survey%20Application%20System.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-10T14:59:42.275166Z","id":"CVE-2025-12929","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-10T14:59:47.356Z"}}]}}