The LogIn-SignUp project by VishnuSivadasVS is vulnerable to SQL Injection due to unsafe construction of SQL queries in DataBase.php. The functions logIn() and signUp() build queries by directly concatenating user input and unvalidated table names without using prepared statements. While a prepareData() function exists, it is insufficient to prevent SQL injection and does not sanitize the table name.
References
Configurations
No configuration.
History
26 Aug 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-22 19:15
Updated : 2025-08-26 14:15
NVD link : CVE-2025-51092
Mitre link : CVE-2025-51092
CVE.ORG link : CVE-2025-51092
JSON object : View
Products Affected
No product.
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')