CVE-2025-7936

A vulnerability has been found in fuyang_lipengjun platform up to ca9aceff6902feb7b0b6bf510842aea88430796a and classified as critical. Affected by this vulnerability is the function queryPage of the file com/platform/controller/ScheduleJobLogController.java. The manipulation of the argument beanName/methodName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
References
Link Resource
https://gitee.com/fuyang_lipengjun/platform/issues/ICLIK1 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.317065 Permissions Required VDB Entry
https://vuldb.com/?id.317065 Third Party Advisory VDB Entry
https://vuldb.com/?submit.618979 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:fuyang_lipengjun:platform:1.0.0:*:*:*:*:*:*:*

History

07 Oct 2025, 20:31

Type Values Removed Values Added
First Time Fuyang Lipengjun platform
Fuyang Lipengjun
CPE cpe:2.3:a:fuyang_lipengjun:platform:1.0.0:*:*:*:*:*:*:*
References () https://gitee.com/fuyang_lipengjun/platform/issues/ICLIK1 - () https://gitee.com/fuyang_lipengjun/platform/issues/ICLIK1 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.317065 - () https://vuldb.com/?ctiid.317065 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317065 - () https://vuldb.com/?id.317065 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.618979 - () https://vuldb.com/?submit.618979 - Third Party Advisory, VDB Entry

22 Jul 2025, 13:05

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en la plataforma fuyang_lipengjun hasta ca9aceff6902feb7b0b6bf510842aea88430796a, clasificada como crítica. Esta vulnerabilidad afecta a la función queryPage del archivo com/platform/controller/ScheduleJobLogController.java. La manipulación del argumento beanName/methodName provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de información sobre las versiones afectadas ni sobre las actualizadas.

21 Jul 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-21 20:15

Updated : 2025-10-07 20:31


NVD link : CVE-2025-7936

Mitre link : CVE-2025-7936

CVE.ORG link : CVE-2025-7936


JSON object : View

Products Affected

fuyang_lipengjun

  • platform
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')