{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-3402","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-04-07T10:13:23.048Z","datePublished":"2025-04-08T02:31:05.732Z","dateUpdated":"2025-04-08T18:24:29.189Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-04-08T02:31:05.732Z"},"title":"Seeyon Zhiyuan Interconnect FE Collaborative Office Platform check.js%70 sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Seeyon","product":"Zhiyuan Interconnect FE Collaborative Office Platform","versions":[{"version":"5.5.2","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform 5.5.2 and classified as critical. This issue affects some unknown processing of the file /sysform/042/check.js%70. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform 5.5.2 gefunden. Dies betrifft einen unbekannten Teil der Datei /sysform/042/check.js%70. Durch die Manipulation des Arguments Name mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-04-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-04-07T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-04-07T12:18:41.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Angel (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.303647","name":"VDB-303647 | Seeyon Zhiyuan Interconnect FE Collaborative Office Platform check.js%70 sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.303647","name":"VDB-303647 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.542343","name":"Submit #542343 | BeiJing Seeyon Internet Software Corp. Seeyon FE Collaborative Office Platform V5.5.2 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Angel12345623/CVE/blob/main/CVE_1.md","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/Angel12345623/CVE/blob/main/CVE_1.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-08T15:49:10.095373Z","id":"CVE-2025-3402","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-08T18:24:29.189Z"}}]}}