{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-54790","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-07-29T16:50:28.393Z","datePublished":"2025-08-01T23:37:23.353Z","dateUpdated":"2025-08-04T15:22:29.986Z"},"containers":{"cna":{"title":"Files: Potential for SQL Injection through File Browse and List Operations","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":9.2,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/humhub/cfiles/security/advisories/GHSA-rfvq-g9rm-pgqj","tags":["x_refsource_CONFIRM"],"url":"https://github.com/humhub/cfiles/security/advisories/GHSA-rfvq-g9rm-pgqj"},{"name":"https://github.com/humhub/cfiles/pull/252","tags":["x_refsource_MISC"],"url":"https://github.com/humhub/cfiles/pull/252"},{"name":"https://github.com/humhub/cfiles/releases/tag/v0.16.10","tags":["x_refsource_MISC"],"url":"https://github.com/humhub/cfiles/releases/tag/v0.16.10"}],"affected":[{"vendor":"humhub","product":"cfiles","versions":[{"version":"< 0.16.10","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-08-01T23:37:23.353Z"},"descriptions":[{"lang":"en","value":"Files is a module for managing files inside spaces and user profiles. In versions 0.16.9 and below, Files does not have logic to prevent the exploitation of backend SQL queries without direct output, potentially allowing unauthorized data access. This is fixed in version 0.16.10."}],"source":{"advisory":"GHSA-rfvq-g9rm-pgqj","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-04T15:22:23.320059Z","id":"CVE-2025-54790","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-04T15:22:29.986Z"}}]}}