Version 5.20 of MegaBIP fixes this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27940 | While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability. Version 5.20 of MegaBIP fixes this issue. |
Fri, 23 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 May 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | While editing pages managed by MegaBIP a user with high privileges is prompted to give a reasoning for performing this action. Input provided by the the user is not sanitized, leading to SQL Injection vulnerability. Version 5.20 of MegaBIP fixes this issue. | |
| Title | SQL Injection in MegaBIP | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-05-23T12:13:22.569Z
Reserved: 2025-04-23T09:52:14.342Z
Link: CVE-2025-3893
Updated: 2025-05-23T12:13:17.892Z
Status : Deferred
Published: 2025-05-23T11:15:32.660
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-3893
No data.
OpenCVE Enrichment
Updated: 2025-06-23T19:31:59Z
EUVD