CVE-2025-6867

A vulnerability was found in SourceCodester Simple Company Website 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/services/manage.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/ez-lbz/poc/issues/23 Exploit Issue Tracking
https://vuldb.com/?ctiid.314339 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.314339 Third Party Advisory VDB Entry
https://vuldb.com/?submit.603637 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
https://github.com/ez-lbz/poc/issues/23 Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_company_website:1.0:*:*:*:*:*:*:*

History

08 Jul 2025, 14:38

Type Values Removed Values Added
References () https://github.com/ez-lbz/poc/issues/23 - () https://github.com/ez-lbz/poc/issues/23 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.314339 - () https://vuldb.com/?ctiid.314339 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.314339 - () https://vuldb.com/?id.314339 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.603637 - () https://vuldb.com/?submit.603637 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
CPE cpe:2.3:a:oretnom23:simple_company_website:1.0:*:*:*:*:*:*:*
First Time Oretnom23 simple Company Website
Oretnom23

30 Jun 2025, 16:15

Type Values Removed Values Added
References () https://github.com/ez-lbz/poc/issues/23 - () https://github.com/ez-lbz/poc/issues/23 -
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Simple Company Website 1.0, clasificada como crítica. Este problema afecta a un procesamiento desconocido del archivo /admin/services/manage.php. La manipulación del ID del argumento provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

29 Jun 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-29 19:15

Updated : 2025-07-08 14:38


NVD link : CVE-2025-6867

Mitre link : CVE-2025-6867

CVE.ORG link : CVE-2025-6867


JSON object : View

Products Affected

oretnom23

  • simple_company_website
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')