Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6j8f-88mh-r9vq | SQL injection in funadmin |
| Link | Providers |
|---|---|
| https://github.com/funadmin/funadmin/issues/24 |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 29 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Funadmin
Funadmin funadmin |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:funadmin:funadmin:5.0.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Funadmin
Funadmin funadmin |
|
| Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Funadmin v5.0.2 has an arbitrary file read vulnerability in /curd/index/editfile. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-29T17:53:19.131Z
Reserved: 2024-10-08T00:00:00.000Z
Link: CVE-2024-48224
Updated: 2024-10-29T17:53:13.897Z
Status : Analyzed
Published: 2024-10-25T21:15:03.793
Modified: 2024-10-31T15:32:45.133
Link: CVE-2024-48224
No data.
OpenCVE Enrichment
No data.
Github GHSA