Warehouse Management System

4 CVEs product

Monthly

CVE-2026-1059 HIGH POC This Week

SQL injection in FeMiner Warehouse Management System's /src/chkuser.php endpoint allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided patches despite early notification. The flaw affects all versions up to commit 9cad1f1b179a98b9547fd003c23b07c7594775fa and enables attackers to potentially read, modify, or delete sensitive warehouse data.

PHP SQLi Warehouse Management System
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2025-65879 HIGH POC This Week

Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads.

Path Traversal Warehouse Management System
NVD GitHub
CVSS 3.1
8.1
EPSS
0.9%
CVE-2025-65878 HIGH POC This Week

The warehouse management system version 1.2 contains an arbitrary file read vulnerability. The endpoint `/file/showImageByPath` does not sanitize user-controlled path parameters. An attacker could exploit directory traversal to read arbitrary files on the server's file system. This could lead to the leakage of sensitive system information.

Path Traversal Warehouse Management System
NVD GitHub
CVSS 3.1
7.5
EPSS
0.7%
CVE-2025-5163 MEDIUM POC This Week

A vulnerability, which was classified as problematic, was found in yangshare 技术杨工 warehouseManager 仓库管理系统 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Warehouse Management System
NVD GitHub VulDB
CVSS 4.0
6.9
EPSS
0.2%
CVE-2026-1059
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in FeMiner Warehouse Management System's /src/chkuser.php endpoint allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided patches despite early notification. The flaw affects all versions up to commit 9cad1f1b179a98b9547fd003c23b07c7594775fa and enables attackers to potentially read, modify, or delete sensitive warehouse data.

PHP SQLi Warehouse Management System
NVD GitHub VulDB
CVE-2025-65879
EPSS 1% CVSS 8.1
HIGH POC This Week

Warehouse Management System 1.2 contains an authenticated arbitrary file deletion vulnerability. The /goods/deleteGoods endpoint accepts a user-controlled goodsimg parameter, which is directly concatenated with the server's UPLOAD_PATH and passed to File.delete() without validation. A remote authenticated attacker can delete arbitrary files on the server by supplying directory traversal payloads.

Path Traversal Warehouse Management System
NVD GitHub
CVE-2025-65878
EPSS 1% CVSS 7.5
HIGH POC This Week

The warehouse management system version 1.2 contains an arbitrary file read vulnerability. The endpoint `/file/showImageByPath` does not sanitize user-controlled path parameters. An attacker could exploit directory traversal to read arbitrary files on the server's file system. This could lead to the leakage of sensitive system information.

Path Traversal Warehouse Management System
NVD GitHub
CVE-2025-5163
EPSS 0% CVSS 6.9
MEDIUM POC This Week

A vulnerability, which was classified as problematic, was found in yangshare 技术杨工 warehouseManager 仓库管理系统 1.0. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Warehouse Management System
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy