{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6535","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-23T14:32:29.709Z","datePublished":"2025-06-24T01:00:20.961Z","dateUpdated":"2025-06-24T13:31:39.305Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-24T01:00:20.961Z"},"title":"xxyopen/201206030 novel-plus User Management Module UserMapper.xml list sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"xxyopen","product":"novel-plus","versions":[{"version":"5.1.0","status":"affected"},{"version":"5.1.1","status":"affected"},{"version":"5.1.2","status":"affected"},{"version":"5.1.3","status":"affected"}],"modules":["User Management Module"]},{"vendor":"201206030","product":"novel-plus","versions":[{"version":"5.1.0","status":"affected"},{"version":"5.1.1","status":"affected"},{"version":"5.1.2","status":"affected"},{"version":"5.1.3","status":"affected"}],"modules":["User Management Module"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in xxyopen/201206030 novel-plus up to 5.1.3 and classified as critical. This vulnerability affects the function list of the file novel-admin/src/main/resources/mybatis/system/UserMapper.xml of the component User Management Module. The manipulation of the argument sort/order leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In xxyopen/201206030 novel-plus bis 5.1.3 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es die Funktion list der Datei novel-admin/src/main/resources/mybatis/system/UserMapper.xml der Komponente User Management Module. Dank der Manipulation des Arguments sort/order mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-23T16:37:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bpy9ft (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313654","name":"VDB-313654 | xxyopen/201206030 novel-plus User Management Module UserMapper.xml list sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313654","name":"VDB-313654 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.596573","name":"Submit #596573 | xxyopen novel-plus 5.1.3 SQL Injection","tags":["third-party-advisory"]},{"url":"https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure","tags":["related"]},{"url":"https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure#poc","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://blog.0xd00.com/blog/sqli-in-user-list-leads-to-sensitive-data-disclosure","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-24T13:31:36.291812Z","id":"CVE-2025-6535","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-24T13:31:39.305Z"}}]}}