CVE-2025-64092

7.5HIGH

This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.

Publicado: 1/9/2026Actualizado: 1/13/2026

Descripción

This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.

Análisis IAImpulsado por IA

Referencias