CVE-2025-63742

SQL Injection vulnerability in function setwxqyAction in file webmain/task/api/loginAction.php in Xinhu Rainrock RockOA 2.7.0 allowing attackers gain sensitive information, including administrator accounts, password hashes, database structure, and other critical data via the shouji and userid parameters.
References
Link Resource
https://github.com/rainrocka/xinhu/issues/14 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockoa:rockoa:2.7.0:*:*:*:*:*:*:*

History

12 Dec 2025, 12:27

Type Values Removed Values Added
First Time Rockoa
Rockoa rockoa
References () https://github.com/rainrocka/xinhu/issues/14 - () https://github.com/rainrocka/xinhu/issues/14 - Exploit, Third Party Advisory, Issue Tracking
CPE cpe:2.3:a:rockoa:rockoa:2.7.0:*:*:*:*:*:*:*

11 Dec 2025, 20:16

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

09 Dec 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-09 17:15

Updated : 2025-12-12 12:27


NVD link : CVE-2025-63742

Mitre link : CVE-2025-63742

CVE.ORG link : CVE-2025-63742


JSON object : View

Products Affected

rockoa

  • rockoa
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')