A weakness has been identified in SourceCodester Water Billing System 1.0. Affected is an unknown function of the file /paybill.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
References
Link | Resource |
---|---|
https://github.com/0510green-hand/cve/issues/7 | Exploit Issue Tracking Third Party Advisory |
https://vuldb.com/?ctiid.321926 | Permissions Required VDB Entry |
https://vuldb.com/?id.321926 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.639226 | Third Party Advisory VDB Entry |
https://www.sourcecodester.com/ | Product |
https://github.com/0510green-hand/cve/issues/7 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
08 Sep 2025, 16:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:janobe:water_billing_system:1.0:*:*:*:*:*:*:* | |
First Time |
Janobe water Billing System
Janobe |
|
References | () https://github.com/0510green-hand/cve/issues/7 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.321926 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.321926 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.639226 - Third Party Advisory, VDB Entry | |
References | () https://www.sourcecodester.com/ - Product |
02 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/0510green-hand/cve/issues/7 - |
30 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-30 21:15
Updated : 2025-09-08 16:51
NVD link : CVE-2025-9705
Mitre link : CVE-2025-9705
CVE.ORG link : CVE-2025-9705
JSON object : View
Products Affected
janobe
- water_billing_system