{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-1820","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-01T14:36:25.395Z","datePublished":"2025-03-02T17:00:06.863Z","dateUpdated":"2025-03-03T19:02:30.496Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-02T17:00:06.863Z"},"title":"zj1983 zz ZworkflowAction.java getOaWid sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"zj1983","product":"zz","versions":[{"version":"2024-8","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. The manipulation of the argument tableId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In zj1983 zz bis 2024-8 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Dabei geht es um die Funktion getOaWid der Datei src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. Durch Manipulation des Arguments tableId mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-01T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-01T15:41:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Caigo (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.298093","name":"VDB-298093 | zj1983 zz ZworkflowAction.java getOaWid sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.298093","name":"VDB-298093 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.504478","name":"Submit #504478 | https://gitee.com/zj1983/zz zz 2024-8 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-03T19:02:17.888617Z","id":"CVE-2025-1820","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-03T19:02:30.496Z"}}]}}