A weakness has been identified in yanyutao0402 ChanCMS up to 3.3.0. Impacted is the function Search of the file app/modules/api/service/Api.js. Executing manipulation of the argument key can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e5.md | Broken Link |
https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e5.md#poc | Broken Link |
https://vuldb.com/?ctiid.323483 | Permissions Required VDB Entry |
https://vuldb.com/?id.323483 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.639777 | Third Party Advisory VDB Entry |
Configurations
History
15 Sep 2025, 14:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Chancms chancms
Chancms |
|
CPE | cpe:2.3:a:chancms:chancms:*:*:*:*:*:*:*:* | |
References | () https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e5.md - Broken Link | |
References | () https://github.com/August829/Yu/blob/main/58ead8e7e08bfb0e5.md#poc - Broken Link | |
References | () https://vuldb.com/?ctiid.323483 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.323483 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.639777 - Third Party Advisory, VDB Entry |
10 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-10 19:15
Updated : 2025-09-15 14:53
NVD link : CVE-2025-10210
Mitre link : CVE-2025-10210
CVE.ORG link : CVE-2025-10210
JSON object : View
Products Affected
chancms
- chancms