SQL Injection Vulnerability in Fantasy-Cricket by Code-Projects
CVE-2025-0563
Key Information:
- Vendor
- Code-projects
- Status
- Fantasy-cricket
- Vendor
- CVE Published:
- 19 January 2025
Badges
Summary
A vulnerability was identified in the Fantasy-Cricket application version 1.0 by Code-Projects, specifically within the update.php file. The flaw arises from the manipulation of the 'uname' argument, which exposes the application to SQL injection attacks. This type of vulnerability allows attackers to execute arbitrary SQL queries against the database, potentially leading to unauthorized access to sensitive information. As the vulnerability permits remote exploitation, immediate attention to securing the affected product is crucial.
Affected Version(s)
Fantasy-Cricket 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published