While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability.  Version 5.20 of MegaBIP fixes this issue.
History

Fri, 23 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 May 2025 10:30:00 +0000

Type Values Removed Values Added
Description While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability.  Version 5.20 of MegaBIP fixes this issue.
Title SQL Injection in MegaBIP
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-05-23T10:20:02.391Z

Updated: 2025-05-23T12:13:22.569Z

Reserved: 2025-04-23T09:52:14.342Z

Link: CVE-2025-3893

cve-icon Vulnrichment

Updated: 2025-05-23T12:13:17.892Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-23T11:15:32.660

Modified: 2025-05-23T15:54:42.643

Link: CVE-2025-3893

cve-icon Redhat

No data.