CVE-2025-6868

A vulnerability was found in SourceCodester Simple Company Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/clients/manage.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/ez-lbz/poc/issues/24 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.314340 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.314340 Third Party Advisory VDB Entry
https://vuldb.com/?submit.603638 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
https://github.com/ez-lbz/poc/issues/24 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_company_website:1.0:*:*:*:*:*:*:*

History

08 Jul 2025, 14:37

Type Values Removed Values Added
References () https://github.com/ez-lbz/poc/issues/24 - () https://github.com/ez-lbz/poc/issues/24 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.314340 - () https://vuldb.com/?ctiid.314340 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.314340 - () https://vuldb.com/?id.314340 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.603638 - () https://vuldb.com/?submit.603638 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
First Time Oretnom23 simple Company Website
Oretnom23
CPE cpe:2.3:a:oretnom23:simple_company_website:1.0:*:*:*:*:*:*:*

30 Jun 2025, 16:15

Type Values Removed Values Added
References () https://github.com/ez-lbz/poc/issues/24 - () https://github.com/ez-lbz/poc/issues/24 -
Summary
  • (es) Se encontró una vulnerabilidad en SourceCodester Simple Company Website 1.0. Se ha clasificado como crítica. Se ve afectada una función desconocida del archivo /admin/clients/manage.php. La manipulación del ID del argumento provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

29 Jun 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-29 19:15

Updated : 2025-07-08 14:37


NVD link : CVE-2025-6868

Mitre link : CVE-2025-6868

CVE.ORG link : CVE-2025-6868


JSON object : View

Products Affected

oretnom23

  • simple_company_website
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')