Search criteria

4 vulnerabilities found for Portal del Empleado by Summar Software

CVE-2025-40678 (GCVE-0-2025-40678)

Vulnerability from cvelistv5 – Published: 2025-09-18 11:47 – Updated: 2025-09-18 13:27
VLAI?
Title
Unrestricted upload vulnerability for dangerous file types on Summar Software´s Portal del Empleado
Summary
Unrestricted upload vulnerability for dangerous file types on Summar Software´s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter “cctl00$ContentPlaceHolder1$fuAdjunto” in “/MemberPages/ntf_absentismo.aspx”.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
Impacted products
Credits
Pedro Gabaldón Juliá Javier Medina Munuera Antonio José Gálvez Sánchez Alejandro Baño Andrés Álvaro Piñero Laorden
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-40678",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-18T13:26:46.370749Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-18T13:27:07.847Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal del Empleado",
          "vendor": "Summar Software",
          "versions": [
            {
              "status": "affected",
              "version": "3.98.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pedro Gabald\u00f3n Juli\u00e1"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Javier Medina Munuera"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Antonio Jos\u00e9 G\u00e1lvez S\u00e1nchez"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Alejandro Ba\u00f1o Andr\u00e9s"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "\u00c1lvaro Pi\u00f1ero Laorden"
        }
      ],
      "datePublic": "2025-09-18T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Unrestricted upload vulnerability for dangerous file types on Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter \u201ccctl00$ContentPlaceHolder1$fuAdjunto\u201d in \u201c/MemberPages/ntf_absentismo.aspx\u201d."
            }
          ],
          "value": "Unrestricted upload vulnerability for dangerous file types on Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter \u201ccctl00$ContentPlaceHolder1$fuAdjunto\u201d in \u201c/MemberPages/ntf_absentismo.aspx\u201d."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-18T11:47:29.812Z",
        "orgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
        "shortName": "INCIBE"
      },
      "references": [
        {
          "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-summar-software-employee-portal"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
            }
          ],
          "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Unrestricted upload vulnerability for dangerous file types on Summar Software\u00b4s Portal del Empleado",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
    "assignerShortName": "INCIBE",
    "cveId": "CVE-2025-40678",
    "datePublished": "2025-09-18T11:47:29.812Z",
    "dateReserved": "2025-04-16T08:38:16.028Z",
    "dateUpdated": "2025-09-18T13:27:07.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-40677 (GCVE-0-2025-40677)

Vulnerability from cvelistv5 – Published: 2025-09-18 11:46 – Updated: 2025-09-18 13:28
VLAI?
Title
SQL injection vulnerability in Summar Software´s Portal del Empleado
Summary
SQL injection vulnerability in Summar Software´s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter “ctl00$ContentPlaceHolder1$filtroNombre” in “/MemberPages/quienesquien.aspx”.
CWE
  • CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
Impacted products
Credits
Pedro Gabaldón Juliá Javier Medina Munuera Antonio José Gálvez Sánchez Alejandro Baño Andrés Álvaro Piñero Laorden
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-40677",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-18T13:27:52.040409Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-18T13:28:42.489Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal del Empleado",
          "vendor": "Summar Software",
          "versions": [
            {
              "status": "affected",
              "version": "3.98.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pedro Gabald\u00f3n Juli\u00e1"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Javier Medina Munuera"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Antonio Jos\u00e9 G\u00e1lvez S\u00e1nchez"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Alejandro Ba\u00f1o Andr\u00e9s"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "\u00c1lvaro Pi\u00f1ero Laorden"
        }
      ],
      "datePublic": "2025-09-18T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "SQL injection vulnerability in Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter \u201cctl00$ContentPlaceHolder1$filtroNombre\u201d in \u201c/MemberPages/quienesquien.aspx\u201d."
            }
          ],
          "value": "SQL injection vulnerability in Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter \u201cctl00$ContentPlaceHolder1$filtroNombre\u201d in \u201c/MemberPages/quienesquien.aspx\u201d."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-18T11:46:31.676Z",
        "orgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
        "shortName": "INCIBE"
      },
      "references": [
        {
          "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-summar-software-employee-portal"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
            }
          ],
          "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "SQL injection vulnerability in Summar Software\u00b4s Portal del Empleado",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
    "assignerShortName": "INCIBE",
    "cveId": "CVE-2025-40677",
    "datePublished": "2025-09-18T11:46:31.676Z",
    "dateReserved": "2025-04-16T08:38:16.028Z",
    "dateUpdated": "2025-09-18T13:28:42.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-40678 (GCVE-0-2025-40678)

Vulnerability from nvd – Published: 2025-09-18 11:47 – Updated: 2025-09-18 13:27
VLAI?
Title
Unrestricted upload vulnerability for dangerous file types on Summar Software´s Portal del Empleado
Summary
Unrestricted upload vulnerability for dangerous file types on Summar Software´s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter “cctl00$ContentPlaceHolder1$fuAdjunto” in “/MemberPages/ntf_absentismo.aspx”.
CWE
  • CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
Impacted products
Credits
Pedro Gabaldón Juliá Javier Medina Munuera Antonio José Gálvez Sánchez Alejandro Baño Andrés Álvaro Piñero Laorden
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-40678",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-18T13:26:46.370749Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-18T13:27:07.847Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal del Empleado",
          "vendor": "Summar Software",
          "versions": [
            {
              "status": "affected",
              "version": "3.98.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pedro Gabald\u00f3n Juli\u00e1"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Javier Medina Munuera"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Antonio Jos\u00e9 G\u00e1lvez S\u00e1nchez"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Alejandro Ba\u00f1o Andr\u00e9s"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "\u00c1lvaro Pi\u00f1ero Laorden"
        }
      ],
      "datePublic": "2025-09-18T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Unrestricted upload vulnerability for dangerous file types on Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter \u201ccctl00$ContentPlaceHolder1$fuAdjunto\u201d in \u201c/MemberPages/ntf_absentismo.aspx\u201d."
            }
          ],
          "value": "Unrestricted upload vulnerability for dangerous file types on Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter \u201ccctl00$ContentPlaceHolder1$fuAdjunto\u201d in \u201c/MemberPages/ntf_absentismo.aspx\u201d."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-434",
              "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-18T11:47:29.812Z",
        "orgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
        "shortName": "INCIBE"
      },
      "references": [
        {
          "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-summar-software-employee-portal"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
            }
          ],
          "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Unrestricted upload vulnerability for dangerous file types on Summar Software\u00b4s Portal del Empleado",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
    "assignerShortName": "INCIBE",
    "cveId": "CVE-2025-40678",
    "datePublished": "2025-09-18T11:47:29.812Z",
    "dateReserved": "2025-04-16T08:38:16.028Z",
    "dateUpdated": "2025-09-18T13:27:07.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-40677 (GCVE-0-2025-40677)

Vulnerability from nvd – Published: 2025-09-18 11:46 – Updated: 2025-09-18 13:28
VLAI?
Title
SQL injection vulnerability in Summar Software´s Portal del Empleado
Summary
SQL injection vulnerability in Summar Software´s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter “ctl00$ContentPlaceHolder1$filtroNombre” in “/MemberPages/quienesquien.aspx”.
CWE
  • CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
Impacted products
Credits
Pedro Gabaldón Juliá Javier Medina Munuera Antonio José Gálvez Sánchez Alejandro Baño Andrés Álvaro Piñero Laorden
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-40677",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-18T13:27:52.040409Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-18T13:28:42.489Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal del Empleado",
          "vendor": "Summar Software",
          "versions": [
            {
              "status": "affected",
              "version": "3.98.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pedro Gabald\u00f3n Juli\u00e1"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Javier Medina Munuera"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Antonio Jos\u00e9 G\u00e1lvez S\u00e1nchez"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Alejandro Ba\u00f1o Andr\u00e9s"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "\u00c1lvaro Pi\u00f1ero Laorden"
        }
      ],
      "datePublic": "2025-09-18T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "SQL injection vulnerability in Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter \u201cctl00$ContentPlaceHolder1$filtroNombre\u201d in \u201c/MemberPages/quienesquien.aspx\u201d."
            }
          ],
          "value": "SQL injection vulnerability in Summar Software\u00b4s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter \u201cctl00$ContentPlaceHolder1$filtroNombre\u201d in \u201c/MemberPages/quienesquien.aspx\u201d."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-18T11:46:31.676Z",
        "orgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
        "shortName": "INCIBE"
      },
      "references": [
        {
          "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-summar-software-employee-portal"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
            }
          ],
          "value": "The vulnerabilities have been fixed by the Summar Software team in version 3.98.0."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "SQL injection vulnerability in Summar Software\u00b4s Portal del Empleado",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "0cbda920-cd7f-484a-8e76-bf7f4b7f4516",
    "assignerShortName": "INCIBE",
    "cveId": "CVE-2025-40677",
    "datePublished": "2025-09-18T11:46:31.676Z",
    "dateReserved": "2025-04-16T08:38:16.028Z",
    "dateUpdated": "2025-09-18T13:28:42.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}