fkie_cve-2025-27753
Vulnerability from fkie_nvd
Published
2025-06-05 14:15
Modified
2025-06-17 21:15
Severity ?
Summary
A SQLi vulnerability in RSMediaGallery component 1.7.4 - 2.1.6 for Joomla was discovered. The vulnerability is due to the use of unescaped user-supplied parameters in SQL queries within the dashboard component. This allows an authenticated attacker to inject malicious SQL code through unsanitized input fields, which are used directly in SQL queries. Exploiting this flaw can lead to unauthorized database access, data leakage, or modification of records.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQLi vulnerability in RSMediaGallery component 1.7.4 - 2.1.6 for Joomla was discovered. The vulnerability is due to the use of unescaped user-supplied parameters in SQL queries within the dashboard component. This allows an authenticated attacker to inject malicious SQL code through unsanitized input fields, which are used directly in SQL queries. Exploiting this flaw can lead to unauthorized database access, data leakage, or modification of records." }, { "lang": "es", "value": "Se descubri\u00f3 una vulnerabilidad SQLi en el componente RSMediaGallery 1.7.4 - 2.1.6 para Joomla. Esta vulnerabilidad se debe al uso de par\u00e1metros proporcionados por el usuario sin escape en las consultas SQL dentro del componente del panel de control. Esto permite a un atacante autenticado inyectar c\u00f3digo SQL malicioso a trav\u00e9s de campos de entrada no depurados, que se utilizan directamente en las consultas SQL. Explotar esta vulnerabilidad puede provocar acceso no autorizado a la base de datos, fuga de datos o modificaci\u00f3n de registros." } ], "id": "CVE-2025-27753", "lastModified": "2025-06-17T21:15:37.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-06-05T14:15:31.550", "references": [ { "source": "security@joomla.org", "url": "https://rsjoomla.com/" } ], "sourceIdentifier": "security@joomla.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security@joomla.org", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…