{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9749","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-31T08:12:26.122Z","datePublished":"2025-08-31T22:32:06.213Z","dateUpdated":"2025-09-02T15:12:43.226Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-31T22:32:06.213Z"},"title":"HKritesh009 Grocery List Management Web App update.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"HKritesh009","product":"Grocery List Management Web App","versions":[{"version":"f491b681eb70d465f445c9a721415c965190f83b","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in HKritesh009 Grocery List Management Web App up to f491b681eb70d465f445c9a721415c965190f83b. This affects an unknown part of the file /src/update.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."},{"lang":"de","value":"In HKritesh009 Grocery List Management Web App bis f491b681eb70d465f445c9a721415c965190f83b wurde eine Schwachstelle gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei /src/update.php. Durch Manipulieren des Arguments ID mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. Dieses Produkt verzichtet auf eine Versionierung und verwendet stattdessen Rolling Releases. Deshalb sind keine Details zu betroffenen oder zu aktualisierende Versionen vorhanden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-31T10:17:29.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"0xSebin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.322050","name":"VDB-322050 | HKritesh009 Grocery List Management Web App update.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.322050","name":"VDB-322050 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.640488","name":"Submit #640488 | GitHub Grocery List Management Web App 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819","tags":["related"]},{"url":"https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819#steps-to-reproduce","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819","tags":["exploit"]},{"url":"https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819#steps-to-reproduce","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-02T14:34:46.459148Z","id":"CVE-2025-9749","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-02T15:12:43.226Z"}}]}}