CVE-2023-25330
ADVISORY - githubSummary
MyBatis-Plus below 3.5.3.1 is vulnerable to SQL injection via the tenant ID value. This may allow remote attackers to execute arbitrary SQL commands.
EPSS Score: 0.00485 (0.646)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
ADVISORY - github
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
ADVISORY - gitlab
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
NIST
CREATED
UPDATED
ADVISORY IDCVE-2023-25330
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
9.8criticalGitHub
CREATED
UPDATED
ADVISORY IDGHSA-32qq-m9fh-f74w
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
9.8criticalintheWild
CREATED
UPDATED
ADVISORY IDCVE-2023-25330
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-