0
CVE-2025-48161
- EPSS 0.04%
- Veröffentlicht 16.07.2025 10:36:56
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
YaySMTP <= 1.3 - Authenticated (Administrator+) SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YaySMTP smtp-sendinblue allows SQL Injection.This issue affects YaySMTP: from n/a through <= 1.3.Mögliche Gegenmaßnahme
SMTP for Sendinblue – YaySMTP: Update to version 1.3.1, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
SMTP for Sendinblue – YaySMTP
Version
*-1.3
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerYayCommerce
≫
Produkt
YaySMTP
Default Statusunaffected
Version <=
1.3
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.112 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.