Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:qdpm:qdpm:*:*:*:*:*:*:*:* |
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | qdPM 9.1 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through filter_by parameters. Attackers can submit malicious POST requests to the timeReport endpoint with crafted filter_by[CommentCreatedFrom] and filter_by[CommentCreatedTo] parameters to execute arbitrary SQL queries and retrieve sensitive data. | |
| Title | qdPM 9.1 SQL Injection via filter_by Parameters | |
| First Time appeared |
Qdpm
Qdpm qdpm |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:qdpm:qdpm:8.3:*:*:*:*:*:*:* cpe:2.3:a:qdpm:qdpm:9.0:*:*:*:*:*:*:* cpe:2.3:a:qdpm:qdpm:9.1:*:*:*:*:*:*:* cpe:2.3:a:qdpm:qdpm:9.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Qdpm
Qdpm qdpm |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-26T18:35:47.179Z
Reserved: 2026-03-26T11:34:36.724Z
Link: CVE-2018-25208
Updated: 2026-03-26T18:35:42.690Z
Status : Analyzed
Published: 2026-03-26T12:16:06.047
Modified: 2026-04-20T14:09:24.293
Link: CVE-2018-25208
No data.
OpenCVE Enrichment
Updated: 2026-03-27T08:36:02Z