{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15443","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-03T18:42:04.239Z","datePublished":"2026-01-04T11:32:06.140Z","dateUpdated":"2026-02-23T08:12:58.312Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:12:58.312Z"},"title":"CRMEB product_export sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"CRMEB","versions":[{"version":"5.6.0","status":"affected"},{"version":"5.6.1","status":"affected"}],"cpes":["cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in CRMEB up to 5.6.1. This issue affects some unknown processing of the file /adminapi/product/product_export. Such manipulation of the argument cate_id leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-03T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-03T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-15T07:34:57.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Tophant (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.339465","name":"VDB-339465 | CRMEB product_export sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.339465","name":"VDB-339465 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.721916","name":"Submit #721916 | crmeb v5.6.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/En0t5/vul/blob/main/crmeb/crmeb-product-productExport-SQL.md","tags":["related"]},{"url":"https://github.com/En0t5/vul/blob/main/crmeb/crmeb-product-productExport-SQL.md#poc","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-06T19:31:28.519624Z","id":"CVE-2025-15443","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-06T19:31:40.927Z"}}]}}