Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://hackerone.com/reports/3249794 |
|
Fri, 13 Feb 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 27 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Expressionengine
Expressionengine expressionengine |
|
| Vendors & Products |
Expressionengine
Expressionengine expressionengine |
Mon, 26 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL Injection vulnerability in the Structure for Admin authenticated user | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2026-01-27T15:08:40.510Z
Reserved: 2025-09-16T15:00:07.876Z
Link: CVE-2025-59473
Updated: 2026-01-27T15:08:29.273Z
Status : Analyzed
Published: 2026-01-26T22:15:53.157
Modified: 2026-02-13T14:22:09.860
Link: CVE-2025-59473
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:03:34Z