{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-5325","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-29T08:34:32.371Z","datePublished":"2025-05-29T19:31:04.427Z","dateUpdated":"2025-05-30T12:34:01.541Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-29T19:31:04.427Z"},"title":"zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 testService special elements used in a template engine","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1336","lang":"en","description":"Improper Neutralization of Special Elements Used in a Template Engine"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-791","lang":"en","description":"Incomplete Filtering of Special Elements"}]}],"affected":[{"vendor":"zhilink 智互联(深圳)科技有限公司","product":"ADP Application Developer Platform 应用开发者平台","versions":[{"version":"1.0.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adpweb/a/ica/api/service/rfa/testService. The manipulation leads to improper neutralization of special elements used in a template engine. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 1.0.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht näher bekannte Funktion der Datei /adpweb/a/ica/api/service/rfa/testService. Durch das Beeinflussen mit unbekannten Daten kann eine improper neutralization of special elements used in a template engine-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-05-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-29T10:39:39.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Id3al (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.310495","name":"VDB-310495 | zhilink 智互联(深圳)科技有限公司 ADP Application Developer Platform 应用开发者平台 testService special elements used in a template engine","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.310495","name":"VDB-310495 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.581275","name":"Submit #581275 | 智互联(深圳)科技有限公司 ADP应用开发者平台 zhlink V1.0.0 Command Injection","tags":["third-party-advisory"]}]},"adp":[{"references":[{"url":"https://vuldb.com/?submit.581275","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-30T12:33:45.572152Z","id":"CVE-2025-5325","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-30T12:34:01.541Z"}}]}}