Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 18 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Purei
Purei cms |
|
| Vendors & Products |
Purei
Purei cms |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Purei CMS 1.0 contains a time-based blind SQL injection vulnerability that allows attackers to manipulate database queries through unfiltered user input parameters. Attackers can exploit vulnerable endpoints like getAllParks.php and events-ajax.php by injecting crafted SQL payloads to potentially extract or modify database information. | |
| Title | Purei CMS 1.0 SQL Injection via Multiple Vulnerable Endpoints | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:08:45.566Z
Reserved: 2025-12-11T00:58:28.457Z
Link: CVE-2024-58301
Updated: 2025-12-18T20:48:49.256Z
Status : Deferred
Published: 2025-12-11T22:15:51.390
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-58301
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:46Z