Vulnerabilities (CVE)

Filtered by CWE-89
Total 15992 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-0224 1 Givewp 1 Givewp 2025-06-13 N/A 9.8 CRITICAL
The GiveWP WordPress plugin before 2.24.1 does not properly escape user input before it reaches SQL queries, which could let unauthenticated attackers perform SQL Injection attacks
CVE-2025-44830 1 Engineercms Project 1 Engineercms 2025-06-13 N/A 9.8 CRITICAL
EngineerCMS v1.02 through v.2.0.5 has a SQL injection vulnerability in the /project/addprojtemplet interface.
CVE-2023-29881 1 Phpok 1 Phpok 2025-06-13 N/A 6.5 MEDIUM
phpok 6.4.003 is vulnerable to SQL injection in the function index_f() in phpok64/framework/api/call_control.php.
CVE-2024-40560 1 Project Team 1 Tmall Demo 2025-06-13 N/A 7.3 HIGH
Tmall_demo before v2024.07.03 was discovered to contain a SQL injection vulnerability.
CVE-2025-25426 1 Guchengwuyue 1 Yshopmall 2025-06-12 N/A 7.2 HIGH
yshopmall <=v1.9.0 is vulnerable to SQL Injection in the image listing interface.
CVE-2025-26047 1 Olajowon 1 Loggrove 2025-06-12 N/A 5.1 MEDIUM
Loggrove v1.0 is vulnerable to SQL Injection in the read.py file.
CVE-2025-45240 1 Qianfox 1 Foxcms 2025-06-12 N/A 6.5 MEDIUM
foxcms v1.2.5 was discovered to contain a SQL injection vulnerability via the executeCommand method in DataBackup.php.
CVE-2025-44073 1 Seacms 1 Seacms 2025-06-12 N/A 9.8 CRITICAL
SeaCMS v13.3 was discovered to contain a SQL injection vulnerability via the component admin_comment_news.php.
CVE-2024-11269 1 Mitchelllevy 1 Ahathat 2025-06-12 N/A 7.2 HIGH
The AHAthat Plugin WordPress plugin through 1.6 does not sanitize and escape a parameter before using it in a SQL statement, allowing Admin to perform SQL injection attacks.
CVE-2024-11267 1 Joomlaserviceprovider 1 Jsp Store Locator 2025-06-12 N/A 8.8 HIGH
The JSP Store Locator WordPress plugin through 1.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing user with Contributor to perform SQL injection attacks.
CVE-2025-47785 1 Emlog 1 Emlog 2025-06-12 N/A 8.3 HIGH
Emlog is an open source website building system. In versions up to and including 2.5.9, SQL injection occurs because the $origContent parameter in admin/article_save.php is not strictly filtered. Since admin/article_save.php can be accessed by ordinary registered users, this will cause SQL injection to occur when the registered site is enabled, resulting in the injection of the admin account and password, which is then exploited by the backend remote code execution. As of time of publication, it is unknown whether a fix exists.
CVE-2025-2203 1 Funnelkit 1 Funnel Builder 2025-06-12 N/A 6.1 MEDIUM
The FunnelKit WordPress plugin before 3.10.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
CVE-2024-9879 1 Melapress 1 Melapress File Monitor 2025-06-12 N/A 5.4 MEDIUM
The Melapress File Monitor WordPress plugin before 2.1.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
CVE-2024-9838 1 Flamescorpion 1 Auto Affiliate Links 2025-06-12 N/A 5.4 MEDIUM
The Auto Affiliate Links WordPress plugin before 6.4.7 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
CVE-2024-9831 1 Taskbuilder 1 Taskbuilder 2025-06-12 N/A 7.2 HIGH
The Taskbuilder WordPress plugin before 3.0.9 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
CVE-2025-4863 1 Advayasoftech 1 Gems Erp Portal 2025-06-12 6.5 MEDIUM 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in Advaya Softech GEMS ERP Portal 2.1. This affects an unknown part of the file /studentLogin/studentLogin.action. The manipulation of the argument userId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-4940 1 1000projects 1 Daily College Class Work Report Book 2025-06-12 7.5 HIGH 7.3 HIGH
A vulnerability, which was classified as critical, has been found in 1000 Projects Daily College Class Work Report Book 1.0. This issue affects some unknown processing of the file /admin_info.php. The manipulation of the argument batch leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2025-26086 1 Rsiqueue 1 Management System 2025-06-12 N/A 7.5 HIGH
An unauthenticated blind SQL injection vulnerability exists in RSI Queue Management System v3.0 within the TaskID parameter of the get request handler. Attackers can remotely inject time-delayed SQL payloads to induce server response delays, enabling time-based inference and iterative extraction of sensitive database contents without authentication.
CVE-2025-5857 1 Fabianros 1 Patient Record Management System 2025-06-12 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /urinalysis_record.php. The manipulation of the argument itr_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-32888 2025-06-12 N/A 10.0 CRITICAL
The Amazon JDBC Driver for Redshift is a Type 4 JDBC driver that provides database connectivity through the standard JDBC application program interfaces (APIs) available in the Java Platform, Enterprise Editions. Prior to version 2.1.0.28, SQL injection is possible when using the non-default connection property `preferQueryMode=simple` in combination with application code which has a vulnerable SQL that negates a parameter value. There is no vulnerability in the driver when using the default, extended query mode. Note that `preferQueryMode` is not a supported parameter in Redshift JDBC driver, and is inherited code from Postgres JDBC driver. Users who do not override default settings to utilize this unsupported query mode are not affected. This issue is patched in driver version 2.1.0.28. As a workaround, do not use the connection property `preferQueryMode=simple`. (NOTE: Those who do not explicitly specify a query mode use the default of extended query mode and are not affected by this issue.)