{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-25221","assignerOrgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","state":"PUBLISHED","assignerShortName":"jpcert","dateReserved":"2025-02-04T05:38:52.829Z","datePublished":"2025-02-18T00:10:25.747Z","dateUpdated":"2025-02-18T15:24:46.624Z"},"containers":{"cna":{"affected":[{"vendor":"LuxSoft","product":"The LuxCal Web Calendar","versions":[{"version":"prior to 5.3.3M (MySQL version)","status":"affected"}]},{"vendor":"LuxSoft","product":"The LuxCal Web Calendar","versions":[{"version":"prior to 5.3.3L (SQLite version)","status":"affected"}]}],"descriptions":[{"lang":"en","value":"The LuxCal Web Calendar prior to 5.3.3M (MySQL version) and prior to 5.3.3L (SQLite version) contains an SQL injection vulnerability in pdf.php. If this vulnerability is exploited, information in a database may be deleted, altered, or retrieved."}],"problemTypes":[{"descriptions":[{"description":"Improper neutralization of special elements used in an SQL command ('SQL Injection')","lang":"en-US","cweId":"CWE-89","type":"CWE"}]}],"references":[{"url":"https://www.luxsoft.eu/?download"},{"url":"https://www.luxsoft.eu/lcforum/viewtopic.php?pid=1984#p1984"},{"url":"https://jvn.jp/en/jp/JVN26024080/"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_0":{"version":"3.0","baseSeverity":"HIGH","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}}],"providerMetadata":{"orgId":"ede6fdc4-6654-4307-a26d-3331c018e2ce","shortName":"jpcert","dateUpdated":"2025-02-18T00:10:25.747Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-18T15:24:31.523522Z","id":"CVE-2025-25221","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-18T15:24:46.624Z"}}]}}