{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25947","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-09T17:13:54.064Z","datePublished":"2026-02-10T17:32:56.224Z","dateUpdated":"2026-02-10T19:26:19.859Z"},"containers":{"cna":{"title":"Worklenz Boolean-Based Blind SQL Injection via Improper ORDER BY Clause Input Validation","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/Worklenz/worklenz/security/advisories/GHSA-f2f8-2ppj-85pf","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Worklenz/worklenz/security/advisories/GHSA-f2f8-2ppj-85pf"},{"name":"https://github.com/Worklenz/worklenz/commit/76e5cb0f5dd566fb65586cd3db30ee951c92a32b","tags":["x_refsource_MISC"],"url":"https://github.com/Worklenz/worklenz/commit/76e5cb0f5dd566fb65586cd3db30ee951c92a32b"},{"name":"https://github.com/Worklenz/worklenz/releases/tag/v2.1.7","tags":["x_refsource_MISC"],"url":"https://github.com/Worklenz/worklenz/releases/tag/v2.1.7"}],"affected":[{"vendor":"Worklenz","product":"worklenz","versions":[{"version":"< 2.1.7","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-10T17:32:56.224Z"},"descriptions":[{"lang":"en","value":"Worklenz is a project management tool. Prior to 2.1.7, there are multiple SQL injection vulnerabilities were discovered in backend SQL query construction affecting project and task management controllers, reporting and financial data endpoints, real-time socket.io handlers, and resource allocation and scheduling features. The vulnerability has been patched in version v2.1.7."}],"source":{"advisory":"GHSA-f2f8-2ppj-85pf","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-10T19:26:10.012909Z","id":"CVE-2026-25947","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-10T19:26:19.859Z"}}]}}