{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15493","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-09T11:30:44.838Z","datePublished":"2026-01-09T16:32:06.558Z","dateUpdated":"2026-02-23T08:25:53.233Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:25:53.233Z"},"title":"RainyGao DocSys ReposAuthMapper.xml sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"RainyGao","product":"DocSys","versions":[{"version":"2.02.0","status":"affected"},{"version":"2.02.1","status":"affected"},{"version":"2.02.2","status":"affected"},{"version":"2.02.3","status":"affected"},{"version":"2.02.4","status":"affected"},{"version":"2.02.5","status":"affected"},{"version":"2.02.6","status":"affected"},{"version":"2.02.7","status":"affected"},{"version":"2.02.8","status":"affected"},{"version":"2.02.9","status":"affected"},{"version":"2.02.10","status":"affected"},{"version":"2.02.11","status":"affected"},{"version":"2.02.12","status":"affected"},{"version":"2.02.13","status":"affected"},{"version":"2.02.14","status":"affected"},{"version":"2.02.15","status":"affected"},{"version":"2.02.16","status":"affected"},{"version":"2.02.17","status":"affected"},{"version":"2.02.18","status":"affected"},{"version":"2.02.19","status":"affected"},{"version":"2.02.20","status":"affected"},{"version":"2.02.21","status":"affected"},{"version":"2.02.22","status":"affected"},{"version":"2.02.23","status":"affected"},{"version":"2.02.24","status":"affected"},{"version":"2.02.25","status":"affected"},{"version":"2.02.26","status":"affected"},{"version":"2.02.27","status":"affected"},{"version":"2.02.28","status":"affected"},{"version":"2.02.29","status":"affected"},{"version":"2.02.30","status":"affected"},{"version":"2.02.31","status":"affected"},{"version":"2.02.32","status":"affected"},{"version":"2.02.33","status":"affected"},{"version":"2.02.34","status":"affected"},{"version":"2.02.35","status":"affected"},{"version":"2.02.36","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A flaw has been found in RainyGao DocSys up to 2.02.36. The impacted element is an unknown function of the file src/com/DocSystem/mapping/ReposAuthMapper.xml. Executing a manipulation of the argument searchWord can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-22T18:32:14.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xkalami (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.340271","name":"VDB-340271 | RainyGao DocSys ReposAuthMapper.xml sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.340271","name":"VDB-340271 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.725374","name":"Submit #725374 | https://github.com/RainyGao-GitHub/DocSys/releases/tag/DocSys_V2 RainyGao-GitHub 2.02.36 SQL injection","tags":["third-party-advisory"]},{"url":"https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/sql%E6%B3%A8%E5%85%A52.md","tags":["related"]},{"url":"https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/sql%E6%B3%A8%E5%85%A52.md#vulnerability-analysis-and-reproduction%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90%E5%A4%8D%E7%8E%B0","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/sql%E6%B3%A8%E5%85%A52.md#vulnerability-analysis-and-reproduction%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90%E5%A4%8D%E7%8E%B0","tags":["exploit"]},{"url":"https://github.com/xkalami-Tta0/CVE/blob/main/DocSys/sql%E6%B3%A8%E5%85%A52.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-09T17:47:33.207334Z","id":"CVE-2025-15493","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-09T18:37:10.665Z"}}]}}