Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edtv
Edtv edtv |
|
| Vendors & Products |
Edtv
Edtv edtv |
Fri, 06 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EdTv 2 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the admin/edit_source endpoint with crafted SQL UNION statements to extract database information including schema names, user credentials, and version details. | |
| Title | EdTv 2 SQL Injection via id Parameter | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-09T19:06:04.279Z
Reserved: 2026-03-06T11:29:59.899Z
Link: CVE-2018-25171
Updated: 2026-03-09T19:05:59.223Z
Status : Deferred
Published: 2026-03-06T13:15:58.447
Modified: 2026-04-15T14:53:58.147
Link: CVE-2018-25171
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:07:55Z