GHSA-P2RH-V47G-X486
Vulnerability from github – Published: 2025-09-09 12:30 – Updated: 2025-09-10 09:30
VLAI?
Details
A SQL injection vulnerability has been identified in the SMPP server component of the SMSEagle firmware, specifically affecting the handling of certain parameters within the server's database interactions. The vulnerability is isolated to the SMPP server, which operates with its own dedicated database, separate from the main software's database. This isolation limits the scope of the vulnerability to the SMPP server's operations. The vulnerability arises from improper sanitization of user input in the SMPP server's scripts.
This issue has been fixed in version 6.11.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2025-10095"
],
"database_specific": {
"cwe_ids": [
"CWE-89"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-09-09T10:15:31Z",
"severity": "MODERATE"
},
"details": "A SQL injection vulnerability has been identified in the SMPP server component of the SMSEagle firmware, specifically affecting the handling of certain parameters within the server\u0027s database interactions. The vulnerability is isolated to the SMPP server, which operates with its own dedicated database, separate from the main software\u0027s database. This isolation limits the scope of the vulnerability to the SMPP server\u0027s operations. The vulnerability arises from improper sanitization of user input in the SMPP server\u0027s scripts.\n\nThis issue has been fixed in version 6.11.",
"id": "GHSA-p2rh-v47g-x486",
"modified": "2025-09-10T09:30:57Z",
"published": "2025-09-09T12:30:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10095"
},
{
"type": "WEB",
"url": "https://cert.pl/en/posts/2025/08/CVE-2025-10095"
},
{
"type": "WEB",
"url": "https://cert.pl/en/posts/2025/09/CVE-2025-10095"
},
{
"type": "WEB",
"url": "https://www.smseagle.eu/security-advisory/resolved-sql-injection-in-smpp-component-of-smseagle-software-6-11"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…