A vulnerability, which was classified as critical, was found in codesiddhant Jasmin Ransomware 1.0.1. Affected is an unknown function of the file /checklogin.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?submit.588834
https://vuldb.com/?submit.588833
https://vuldb.com/?ctiid.312564
https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_username.md
https://github.com/YZS17/CVE/blob/main/Jasmin-Ransomware/sqli_password.md
Published: 2025-06-15
Updated: 2025-06-16
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Severity: High
Base Score: 5.5
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00033