SQL Injection vulnerability in function setwxqyAction in file webmain/task/api/loginAction.php in Xinhu Rainrock RockOA 2.7.0 allowing attackers gain sensitive information, including administrator accounts, password hashes, database structure, and other critical data via the shouji and userid parameters.
References
| Link | Resource |
|---|---|
| https://github.com/rainrocka/xinhu/issues/14 | Exploit Third Party Advisory Issue Tracking |
Configurations
History
12 Dec 2025, 12:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rockoa
Rockoa rockoa |
|
| References | () https://github.com/rainrocka/xinhu/issues/14 - Exploit, Third Party Advisory, Issue Tracking | |
| CPE | cpe:2.3:a:rockoa:rockoa:2.7.0:*:*:*:*:*:*:* |
11 Dec 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-89 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
09 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 17:15
Updated : 2025-12-12 12:27
NVD link : CVE-2025-63742
Mitre link : CVE-2025-63742
CVE.ORG link : CVE-2025-63742
JSON object : View
Products Affected
rockoa
- rockoa
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
