{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14531","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-11T09:16:13.564Z","datePublished":"2025-12-11T18:32:08.242Z","dateUpdated":"2025-12-11T18:55:33.626Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-11T18:32:08.242Z"},"title":"code-projects Rental Management System Log Transaction.java crlf injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-93","lang":"en","description":"CRLF Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"code-projects","product":"Rental Management System","versions":[{"version":"2.0","status":"affected"}],"modules":["Log Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in code-projects Rental Management System 2.0. This affects an unknown function of the file Transaction.java of the component Log Handler. Performing manipulation results in crlf injection. The attack can be initiated remotely. The exploit has been made public and could be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-11T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-11T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-11T10:21:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"fanti (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.335872","name":"VDB-335872 | code-projects Rental Management System Log Transaction.java crlf injection","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.335872","name":"VDB-335872 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.703239","name":"Submit #703239 | code-projects rental-management-system 2.0 CRLF Injection","tags":["third-party-advisory"]},{"url":"https://github.com/asd1238525/cve/blob/main/CRLF.md","tags":["exploit"]},{"url":"https://code-projects.org/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-11T18:53:56.254030Z","id":"CVE-2025-14531","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-11T18:55:33.626Z"}}]}}