CVE-2025-64084

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-64084
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64084.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-64084
Aliases
  • GHSA-4r9r-3r3q-jg44
Published
2025-11-14T21:15:45.367Z
Modified
2025-11-21T08:52:49.593181Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vuccdetailsajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vuccqsodetails function.

References

Affected packages

Git / github.com/magicbug/cloudlog

Affected ranges

Type
GIT
Repo
https://github.com/magicbug/cloudlog
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.9
1.9.1
1.9.2
1.9.9

2.*

2.0
2.1
2.2
2.3
2.3.1
2.3.2
2.3.3
2.4
2.4.1
2.4.10
2.4.11
2.4.2
2.4.3
2.4.4
2.4.5
2.4.6
2.4.7
2.4.8
2.4.9
2.5.0
2.5.1
2.5.2
2.6.0
2.6.1
2.6.10
2.6.11
2.6.12
2.6.13
2.6.14
2.6.15
2.6.16
2.6.17
2.6.18
2.6.19
2.6.2
2.6.20
2.6.21
2.6.22
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8
2.6.9
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.7.5