CVE-2025-64084

medium

Description

An authenticated SQL injection vulnerability exists in Cloudlog 2.7.5 and earlier. The vucc_details_ajax function in application/controllers/Awards.php does not properly sanitize the user-supplied Gridsquare POST parameter. This allows a remote, authenticated attacker to execute arbitrary SQL commands by injecting a malicious payload, which is then concatenated directly into a raw SQL query in the vucc_qso_details function.

References

https://github.com/magicbug/Cloudlog/releases/tag/2.7.6

https://github.com/magicbug/Cloudlog/commit/72a8c3d705c8629f60f64da9f37968417c980242

https://github.com/XY20130630/Cloudlog/security/advisories/GHSA-4r9r-3r3q-jg44

Details

Source: Mitre, NVD

Published: 2025-11-14

Updated: 2025-11-19

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Severity: Medium

EPSS

EPSS: 0.00042