{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6629","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-19T16:49:09.118Z","datePublished":"2026-04-20T10:15:19.931Z","dateUpdated":"2026-04-20T15:21:18.092Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-20T10:15:19.931Z"},"title":"Metasoft 美特软件 MetaCRM Interface sql.jsp Statement.executeUpdate sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Metasoft 美特软件","product":"MetaCRM","versions":[{"version":"6.0","status":"affected"},{"version":"6.1","status":"affected"},{"version":"6.2","status":"affected"},{"version":"6.3","status":"affected"},{"version":"6.4.0","status":"affected"}],"modules":["Interface"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Metasoft 美特软件 MetaCRM up to 6.4.0. This vulnerability affects the function Statement.executeUpdate of the file sql.jsp of the component Interface. Such manipulation of the argument sql leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-19T18:54:13.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"0menc (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/358263","name":"VDB-358263 | Metasoft 美特软件 MetaCRM Interface sql.jsp Statement.executeUpdate sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/358263/cti","name":"VDB-358263 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/792615","name":"Submit #792615 | Beijing Meite Software Technology Co., Ltd. MetaCRM6 <6.4.0  SQL Injection","tags":["third-party-advisory"]},{"url":"https://my.feishu.cn/docx/JttndUaPLoR88HxI1alcz1uencf?from=from_copylink","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-20T15:21:04.801292Z","id":"CVE-2026-6629","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-20T15:21:18.092Z"}}]}}