Vulnerabilites related to ScriptAndTools - Real Estate Management System
CVE-2025-6329 (GCVE-0-2025-6329)
Vulnerability from cvelistv5
Published
2025-06-20 09:31
Modified
2025-06-20 13:51
Severity ?
2.1 (Low) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RC:R
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RC:R
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RC:R
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RC:R
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was found in ScriptAndTools Real Estate Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file userdelete.php of the component User Delete Handler. The manipulation of the argument ID leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.313325 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.313325 | signature, permissions-required | |
https://vuldb.com/?submit.596472 | third-party-advisory | |
https://www.websecurityinsights.my.id/2025/06/script-and-tools-real-estate-management.html | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ScriptAndTools | Real Estate Management System |
Version: 1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6329", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-20T13:50:43.917103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-20T13:51:04.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "User Delete Handler" ], "product": "Real Estate Management System", "vendor": "ScriptAndTools", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Maloy Roy Orko" }, { "lang": "en", "type": "reporter", "value": "MaloyRoyOrko (VulDB User)" }, { "lang": "en", "type": "analyst", "value": "MaloyRoyOrko (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ScriptAndTools Real Estate Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file userdelete.php of the component User Delete Handler. The manipulation of the argument ID leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "de", "value": "Eine Schwachstelle wurde in ScriptAndTools Real Estate Management System 1.0 ausgemacht. Sie wurde als kritisch eingestuft. Davon betroffen ist unbekannter Code der Datei userdelete.php der Komponente User Delete Handler. Dank Manipulation des Arguments ID mit unbekannten Daten kann eine authorization bypass-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5.5, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "Authorization Bypass", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-285", "description": "Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T09:31:07.446Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-313325 | ScriptAndTools Real Estate Management System User Delete userdelete.php authorization", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.313325" }, { "name": "VDB-313325 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.313325" }, { "name": "Submit #596472 | Script And Tools Real-Estate-Management-System 1.0 Insecure Direct Object Reference (IDOR)", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.596472" }, { "tags": [ "exploit" ], "url": "https://www.websecurityinsights.my.id/2025/06/script-and-tools-real-estate-management.html" } ], "timeline": [ { "lang": "en", "time": "2025-06-19T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-06-19T00:00:00.000Z", "value": "Exploit disclosed" }, { "lang": "en", "time": "2025-06-19T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-06-19T12:52:25.000Z", "value": "VulDB entry last update" } ], "title": "ScriptAndTools Real Estate Management System User Delete userdelete.php authorization" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-6329", "datePublished": "2025-06-20T09:31:07.446Z", "dateReserved": "2025-06-19T10:10:43.329Z", "dateUpdated": "2025-06-20T13:51:04.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9848 (GCVE-0-2025-9848)
Vulnerability from cvelistv5
Published
2025-09-03 01:02
Modified
2025-09-03 20:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A security vulnerability has been detected in ScriptAndTools Real Estate Management System 1.0. The affected element is an unknown function of the file /admin/userlist.php. Such manipulation leads to execution after redirect. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.322197 | vdb-entry | |
https://vuldb.com/?ctiid.322197 | signature, permissions-required | |
https://vuldb.com/?submit.641980 | third-party-advisory | |
https://www.websecurityinsights.my.id/2025/08/real-estate-management-system-v-10-user.html | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ScriptAndTools | Real Estate Management System |
Version: 1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9848", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T20:15:22.802287Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-03T20:16:02.907Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Real Estate Management System", "vendor": "ScriptAndTools", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Maloy Roy Orko" }, { "lang": "en", "type": "reporter", "value": "MaloyRoyOrko (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A security vulnerability has been detected in ScriptAndTools Real Estate Management System 1.0. The affected element is an unknown function of the file /admin/userlist.php. Such manipulation leads to execution after redirect. The attack can be executed remotely. The exploit has been disclosed publicly and may be used." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in ScriptAndTools Real Estate Management System 1.0 entdeckt. Betroffen ist eine unbekannte Funktion der Datei /admin/userlist.php. Dank Manipulation mit unbekannten Daten kann eine execution after redirect-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz m\u00f6glich. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-698", "description": "Execution After Redirect", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-705", "description": "Incorrect Control Flow Scoping", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T01:02:10.151Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-322197 | ScriptAndTools Real Estate Management System userlist.php redirect", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.322197" }, { "name": "VDB-322197 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.322197" }, { "name": "Submit #641980 | Script And Tools Real Estate Management System 1.0 Broken Access Control", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.641980" }, { "tags": [ "exploit" ], "url": "https://www.websecurityinsights.my.id/2025/08/real-estate-management-system-v-10-user.html" } ], "timeline": [ { "lang": "en", "time": "2025-09-02T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-02T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-02T16:15:45.000Z", "value": "VulDB entry last update" } ], "title": "ScriptAndTools Real Estate Management System userlist.php redirect" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-9848", "datePublished": "2025-09-03T01:02:10.151Z", "dateReserved": "2025-09-02T14:10:38.578Z", "dateUpdated": "2025-09-03T20:16:02.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-9847 (GCVE-0-2025-9847)
Vulnerability from cvelistv5
Published
2025-09-03 01:02
Modified
2025-09-03 20:23
Severity ?
2.1 (Low) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RC:R
VLAI Severity ?
EPSS score ?
Summary
A weakness has been identified in ScriptAndTools Real Estate Management System 1.0. Impacted is an unknown function of the file register.php. This manipulation of the argument uimage causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.322196 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.322196 | signature, permissions-required | |
https://vuldb.com/?submit.641970 | third-party-advisory | |
https://www.websecurityinsights.my.id/2025/08/real-estate-management-system-v-10.html | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ScriptAndTools | Real Estate Management System |
Version: 1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-9847", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T20:19:44.452008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-03T20:23:04.907Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Real Estate Management System", "vendor": "ScriptAndTools", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Maloy Roy Orko" }, { "lang": "en", "type": "reporter", "value": "MaloyRoyOrko (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A weakness has been identified in ScriptAndTools Real Estate Management System 1.0. Impacted is an unknown function of the file register.php. This manipulation of the argument uimage causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited." }, { "lang": "de", "value": "Eine Schwachstelle wurde in ScriptAndTools Real Estate Management System 1.0 gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei register.php. Dank der Manipulation des Arguments uimage mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "Unrestricted Upload", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T01:02:07.659Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-322196 | ScriptAndTools Real Estate Management System register.php unrestricted upload", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.322196" }, { "name": "VDB-322196 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.322196" }, { "name": "Submit #641970 | Script And Tools Real Estate Management System 1.0 Remote Code Execution", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.641970" }, { "tags": [ "exploit" ], "url": "https://www.websecurityinsights.my.id/2025/08/real-estate-management-system-v-10.html" } ], "timeline": [ { "lang": "en", "time": "2025-09-02T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-02T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-02T16:15:44.000Z", "value": "VulDB entry last update" } ], "title": "ScriptAndTools Real Estate Management System register.php unrestricted upload" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-9847", "datePublished": "2025-09-03T01:02:07.659Z", "dateReserved": "2025-09-02T14:10:28.394Z", "dateUpdated": "2025-09-03T20:23:04.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }