Description
ZenTao Biz < 6.5, ZenTao Max < 3.0, ZenTao Open Source Edition < 16.5, and ZenTao Open Source Edition < 16.5.beta1 contain an SQL injection vulnerability in the login functionality. The application does not properly validate the account parameter on /zentao/user-login.html before using it in a database query. A remote unauthenticated attacker can exploit this issue to execute crafted SQL expressions and retrieve sensitive information from the backend database, including user and application data. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC.
Published: 2025-11-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Zentao
Zentao biz
Zentao max
Zentao open Source Edition
CPEs cpe:2.3:a:zentao:biz:*:*:*:*:*:*:*:*
cpe:2.3:a:zentao:max:*:*:*:*:*:*:*:*
cpe:2.3:a:zentao:open_source_edition:*:*:*:*:*:*:*:*
Vendors & Products Zentao
Zentao biz
Zentao max
Zentao open Source Edition

Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Easycorp
Easycorp zentao Biz
Easycorp zentao Max
Easycorp zentao Open Source Edition
Vendors & Products Easycorp
Easycorp zentao Biz
Easycorp zentao Max
Easycorp zentao Open Source Edition

Thu, 13 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
Description ZenTao Biz < 6.5, ZenTao Max < 3.0, ZenTao Open Source Edition < 16.5, and ZenTao Open Source Edition < 16.5.beta1 contain an SQL injection vulnerability in the login functionality. The application does not properly validate the account parameter on /zentao/user-login.html before using it in a database query. A remote unauthenticated attacker can exploit this issue to execute crafted SQL expressions and retrieve sensitive information from the backend database, including user and application data. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC.
Title ZenTao Biz < 6.5, Max < 3.0, & Open Source Edition 16.5/16.5beta1 SQL Injection via user-login.html
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Easycorp Zentao Biz Zentao Max Zentao Open Source Edition
Zentao Biz Max Open Source Edition
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T02:06:55.172Z

Reserved: 2025-11-13T18:08:50.407Z

Link: CVE-2022-4984

cve-icon Vulnrichment

Updated: 2025-11-13T19:59:06.306Z

cve-icon NVD

Status : Deferred

Published: 2025-11-13T20:15:46.853

Modified: 2026-04-15T00:35:42.020

Link: CVE-2022-4984

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-14T09:27:52Z

Weaknesses