{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-4909","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-17T14:40:36.104Z","datePublished":"2025-05-19T03:31:04.997Z","dateUpdated":"2025-05-19T13:47:28.705Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-19T03:31:04.997Z"},"title":"SourceCodester Client Database Management System exposure of information through directory listing","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-548","lang":"en","description":"Exposure of Information Through Directory Listing"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-552","lang":"en","description":"Files or Directories Accessible"}]}],"affected":[{"vendor":"SourceCodester","product":"Client Database Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in SourceCodester Client Database Management System 1.0. This vulnerability affects unknown code. The manipulation leads to exposure of information through directory listing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In SourceCodester Client Database Management System 1.0 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität. Durch die Manipulation mit unbekannten Daten kann eine exposure of information through directory listing-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-05-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-17T16:45:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xxhacker (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.309466","name":"VDB-309466 | SourceCodester Client Database Management System exposure of information through directory listing","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.309466","name":"VDB-309466 | CTI Indicators (IOB, IOC, TTP)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.578723","name":"Submit #578723 | sourcecodester Client Database Management System v1.0 Directory traversal","tags":["third-party-advisory"]},{"url":"https://github.com/dengxun628/cve/issues/3","tags":["exploit","issue-tracking"]},{"url":"https://www.sourcecodester.com/","tags":["product"]}]},"adp":[{"references":[{"url":"https://github.com/dengxun628/cve/issues/3","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-19T13:47:22.893085Z","id":"CVE-2025-4909","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-19T13:47:28.705Z"}}]}}