{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14666","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-13T13:38:39.944Z","datePublished":"2025-12-14T15:32:07.533Z","dateUpdated":"2025-12-15T20:44:12.871Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-14T15:32:07.533Z"},"title":"itsourcecode COVID Tracking System page sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"itsourcecode","product":"COVID Tracking System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in itsourcecode COVID Tracking System 1.0. The affected element is an unknown function of the file /admin/?page=user. This manipulation of the argument Username causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-13T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-13T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-13T14:44:10.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bardminx (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.336398","name":"VDB-336398 | itsourcecode COVID Tracking System page sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.336398","name":"VDB-336398 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.714786","name":"Submit #714786 | itsourcecode COVID Tracking System V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/bardminx/Lonlydance/issues/2","tags":["exploit","issue-tracking"]},{"url":"https://itsourcecode.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-15T20:44:00.664606Z","id":"CVE-2025-14666","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-15T20:44:12.871Z"}}]}}