CVE-2025-2831

A vulnerability has been found in mingyuefusu 明月复苏 tushuguanlixitong 图书管理系统 up to d4836f6b49cd0ac79a4021b15ce99ff7229d4694 and classified as critical. This vulnerability affects the function getBookList of the file /admin/bookList?page=1&limit=10. The manipulation of the argument condition leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://gitee.com/mingyuefusu/tushuguanlixitong/issues/IBTSJL Exploit Issue Tracking
https://vuldb.com/?ctiid.301468 Permissions Required VDB Entry
https://vuldb.com/?id.301468 Third Party Advisory VDB Entry
https://vuldb.com/?submit.521458 Third Party Advisory VDB Entry
https://gitee.com/mingyuefusu/tushuguanlixitong/issues/IBTSJL Exploit Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:mingyuefusu:library_management_system:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-27 03:15

Updated : 2025-04-11 17:00


NVD link : CVE-2025-2831

Mitre link : CVE-2025-2831

CVE.ORG link : CVE-2025-2831


JSON object : View

Products Affected

mingyuefusu

  • library_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')