A vulnerability, which was classified as critical, was found in Econtrata up to 20250516. Affected is an unknown function of the file /valida. The manipulation of the argument usuario leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/yago3008/cves | Not Applicable |
https://vuldb.com/?ctiid.310260 | Permissions Required VDB Entry |
https://vuldb.com/?id.310260 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.579248 | Third Party Advisory VDB Entry |
Configurations
History
03 Jun 2025, 15:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Econtrata
Econtrata econtrata |
|
CPE | cpe:2.3:a:econtrata:econtrata:*:*:*:*:*:*:*:* | |
References | () https://github.com/yago3008/cves - Not Applicable | |
References | () https://vuldb.com/?ctiid.310260 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.310260 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.579248 - Third Party Advisory, VDB Entry |
28 May 2025, 15:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 May 2025, 06:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-26 06:17
Updated : 2025-06-03 15:42
NVD link : CVE-2025-5172
Mitre link : CVE-2025-5172
CVE.ORG link : CVE-2025-5172
JSON object : View
Products Affected
econtrata
- econtrata