Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/W000i/vuln/issues/1 |
|
Fri, 19 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wanliofficial
Wanliofficial lvzhou Cms |
|
| CPEs | cpe:2.3:a:wanliofficial:lvzhou_cms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wanliofficial
Wanliofficial lvzhou Cms |
Tue, 09 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 04 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wanli
Wanli lvzhou Cms |
|
| Vendors & Products |
Wanli
Wanli lvzhou Cms |
Tue, 02 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Tue, 02 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Lvzhou CMS before commit c4ea0eb9cab5f6739b2c87e77d9ef304017ed615 (2025-09-22) is vulnerable to SQL injection via the 'title' parameter in com.wanli.lvzhoucms.service.ContentService#findPage. The parameter is concatenated directly into a dynamic SQL query without sanitization or prepared statements, enabling attackers to read sensitive data from the database. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-09T17:01:57.558Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65877
Updated: 2025-12-02T22:01:15.281Z
Status : Analyzed
Published: 2025-12-02T20:15:53.410
Modified: 2025-12-19T18:20:31.853
Link: CVE-2025-65877
No data.
OpenCVE Enrichment
Updated: 2025-12-04T18:07:08Z