9.3
CVSS 4.0
Share
CVSS VectorNVD
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Lifecycle Timeline
6
Analysis Updated
Apr 16, 2026 - 05:55 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
7.14.3
Analysis Generated
Mar 14, 2026 - 17:53 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:53 euvd
EUVD-2025-16979
CVE Published
Jun 05, 2025 - 10:15 nvd
CRITICAL 9.3
DescriptionNVD
Improper neutralization of input provided by an unauthorized user into changes__reference_id parameter in URL allows for boolean-based Blind SQL Injection attacks.
AnalysisAI
A SQL injection vulnerability (CVSS 9.3). Critical severity with potential for significant impact on affected systems.
Technical ContextAI
CWE-89 (SQL Injection). CVSS 9.3 indicates critical severity with likely remote exploitation vector.
RemediationAI
Monitor vendor channels for patch availability. Implement input validation and WAF rules as interim mitigation.
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-16979