CVE-2025-14667

A security vulnerability has been detected in itsourcecode COVID Tracking System 1.0. The impacted element is an unknown function of the file /admin/?page=system_info. Such manipulation of the argument meta_value leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
References
Link Resource
https://github.com/bardminx/Lonlydance/issues/3 Exploit Issue Tracking Third Party Advisory
https://itsourcecode.com/ Product
https://vuldb.com/?ctiid.336399 Permissions Required VDB Entry
https://vuldb.com/?id.336399 Third Party Advisory VDB Entry
https://vuldb.com/?submit.714805 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:angeljudesuarez:covid_tracking_system:1.0:*:*:*:*:*:*:*

History

23 Dec 2025, 17:34

Type Values Removed Values Added
First Time Angeljudesuarez
Angeljudesuarez covid Tracking System
CPE cpe:2.3:a:angeljudesuarez:covid_tracking_system:1.0:*:*:*:*:*:*:*
References () https://github.com/bardminx/Lonlydance/issues/3 - () https://github.com/bardminx/Lonlydance/issues/3 - Exploit, Issue Tracking, Third Party Advisory
References () https://itsourcecode.com/ - () https://itsourcecode.com/ - Product
References () https://vuldb.com/?ctiid.336399 - () https://vuldb.com/?ctiid.336399 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.336399 - () https://vuldb.com/?id.336399 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.714805 - () https://vuldb.com/?submit.714805 - Third Party Advisory, VDB Entry

14 Dec 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-14 16:15

Updated : 2025-12-23 17:34


NVD link : CVE-2025-14667

Mitre link : CVE-2025-14667

CVE.ORG link : CVE-2025-14667


JSON object : View

Products Affected

angeljudesuarez

  • covid_tracking_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')