• Cybersecurity Vulnerabilities

    CVE-2025-13469: Low-Severity XSS Flaw Found in PKP OMP/OJS Payment Instructions

    Overview CVE-2025-13469 describes a Cross-Site Scripting (XSS) vulnerability identified in Public Knowledge Project (PKP) Open Monograph Press (OMP) and Open Journal Systems (OJS) versions 3.3.0, 3.4.0, and 3.5.0. This vulnerability allows a remote attacker to inject arbitrary web scripts or HTML into a user’s browser. The vulnerability resides within the Payment Instructions Setting Handler of the manual payment plugin. Technical Details The vulnerability exists in the plugins/paymethod/manual/templates/paymentForm.tpl file. The manualInstructions argument is not properly sanitized, allowing an attacker to inject malicious JavaScript code. When a user views the payment form, the injected script will be executed in their browser context.…

  • Cybersecurity Vulnerabilities

    CVE-2025-13468: Critical Unauthorized Deletion Flaw in SourceCodester Alumni Management System

    Overview CVE-2025-13468 is a medium-severity vulnerability affecting SourceCodester Alumni Management System version 1.0. This flaw allows remote attackers to perform unauthorized deletion actions by manipulating the ID parameter used in various delete functions within the `admin_class.php` file. The vulnerability resides in the Delete Handler component and has been publicly disclosed, increasing the risk of exploitation. Technical Details The vulnerability lies within the `admin/admin_class.php` file, specifically affecting the following functions: `delete_forum` `delete_career` `delete_comment` `delete_gallery` `delete_event` By manipulating the `ID` parameter passed to these functions, an attacker can bypass authorization checks and delete data they are not authorized to delete. The lack…

  • Cybersecurity Vulnerabilities

    CVE-2025-13451: Critical SQL Injection Vulnerability Exposes SourceCodester Online Shop Project 1.0

    Overview CVE-2025-13451 is a high-severity SQL injection vulnerability identified in SourceCodester Online Shop Project 1.0. This vulnerability allows a remote attacker to inject malicious SQL code into the application, potentially leading to data breaches, modification of data, or even complete system compromise. The exploit is publicly available, increasing the urgency for users of the affected software to apply the necessary mitigations. Technical Details The vulnerability resides within the /action.php file of the SourceCodester Online Shop Project 1.0. Specifically, the Search argument is susceptible to SQL injection. By crafting a malicious SQL query and injecting it through the Search parameter, an…

  • Cybersecurity Vulnerabilities

    CVE-2025-13450: Cross-Site Scripting Flaw Discovered in SourceCodester Online Shop Project 1.0

    Overview CVE-2025-13450 identifies a reflected Cross-Site Scripting (XSS) vulnerability present in SourceCodester Online Shop Project version 1.0. This vulnerability allows an attacker to inject malicious scripts into the web application, potentially compromising user accounts or defacing the website. The vulnerability is located in the /shop/register.php file and is triggered by manipulating the f_name parameter. Technical Details The vulnerability resides within the register.php file of the SourceCodester Online Shop Project 1.0. Specifically, the application fails to properly sanitize or encode user-supplied input submitted through the f_name parameter during the registration process. An attacker can inject malicious JavaScript code into this parameter,…

  • Cybersecurity Vulnerabilities

    URGENT: SQL Injection Threatens Online Shop Project 1.0 – CVE-2025-13449

    Overview A critical security vulnerability, identified as CVE-2025-13449, has been discovered in Online Shop Project version 1.0. This vulnerability allows for remote SQL injection, potentially leading to unauthorized data access and manipulation. The exploit is public and actively being discussed, making immediate action crucial for users of this software. Technical Details The vulnerability lies within the /login.php file of Online Shop Project 1.0. Specifically, the processing of the Password argument is susceptible to SQL injection. An attacker can craft malicious SQL queries within the Password field, potentially bypassing authentication and gaining access to sensitive database information. The vulnerability is triggered…

  • Cybersecurity Vulnerabilities

    CVE-2025-13446: Critical Stack Buffer Overflow Threatens Tenda AC21 Routers

    Overview CVE-2025-13446 is a high-severity vulnerability affecting Tenda AC21 routers, specifically version 16.03.08.16. This vulnerability is a stack-based buffer overflow that can be triggered remotely, allowing attackers to potentially execute arbitrary code on the affected device. The vulnerability lies in the handling of the `timeZone` and `time` arguments within the `/goform/SetSysTimeCfg` endpoint. Publicly available exploits exist, making immediate mitigation critical. Technical Details The vulnerability is a stack-based buffer overflow. The `SetSysTimeCfg` endpoint in the specified Tenda AC21 firmware version does not properly validate the length of the input provided for the `timeZone` and `time` parameters. By sending overly long strings…

  • Cybersecurity Vulnerabilities

    CVE-2025-13445: Critical Stack Buffer Overflow Exposes Tenda AC21 Routers

    Overview CVE-2025-13445 is a high-severity vulnerability affecting Tenda AC21 routers (version 16.03.08.16). This flaw, a stack-based buffer overflow, can be exploited remotely, allowing attackers to potentially gain unauthorized access and control over the affected device. The vulnerability resides within the /goform/SetIpMacBind file and is triggered through manipulation of arguments. Technical Details The vulnerability is a stack-based buffer overflow located in the SetIpMacBind functionality of the Tenda AC21 router firmware. By crafting a malicious argument list and sending it to the /goform/SetIpMacBind endpoint, an attacker can overwrite data on the stack. This can lead to arbitrary code execution, effectively granting the…

  • Cybersecurity Vulnerabilities

    CVE-2025-13443: Unveiling an Access Control Flaw in macrozheng mall

    Overview This article details CVE-2025-13443, a medium severity vulnerability affecting macrozheng mall versions up to 1.0.3. This vulnerability exposes an improper access control issue in the delete function of the /member/readHistory/delete file. By manipulating the ids argument, attackers can potentially bypass access controls and perform unauthorized actions. A public exploit is available, making immediate mitigation critical. Technical Details The vulnerability resides in the delete function responsible for managing read history entries in the macrozheng mall application. The application fails to adequately validate user permissions before allowing the deletion of read history entries. An attacker can craft a malicious request to…

  • Cybersecurity Vulnerabilities

    CVE-2025-13442: Critical Command Injection Vulnerability Discovered in UTT 进取 750W

    Overview A high-severity command injection vulnerability, identified as CVE-2025-13442, has been discovered in UTT 进取 750W devices up to version 3.2.2-191225. This vulnerability allows a remote attacker to execute arbitrary commands on the affected system. The vulnerability resides within the /goform/formPdbUpConfig endpoint and is triggered by manipulating the policyNames argument. This issue has been publicly disclosed and is actively exploitable. Attempts to contact the vendor have been unsuccessful. Technical Details The vulnerability exists within the /goform/formPdbUpConfig endpoint, which is responsible for handling configuration updates. By crafting a malicious request that includes shell metacharacters within the policyNames argument, an attacker can…

  • Cybersecurity Vulnerabilities

    CVE-2025-13435: Dreampie Resty Path Traversal – A Call to Action for Security!

    Overview CVE-2025-13435 describes a medium-severity path traversal vulnerability found in Dreampie Resty up to version 1.3.1.SNAPSHOT. This vulnerability resides within the HttpClient Module, specifically affecting the Request function in the HttpClient.java file. A remote attacker can exploit this flaw by manipulating the filename argument, potentially gaining unauthorized access to sensitive files and directories on the server. Technical Details The vulnerability stems from insufficient sanitization of the filename parameter within the Request function of /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java. An attacker can inject directory traversal sequences (e.g., ../) into the filename argument. This allows the attacker to bypass intended access restrictions and potentially read arbitrary…