- Description
- A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. The manipulation of the argument tableId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- Source
- cna@vuldb.com
- NVD status
- Analyzed
- Products
- zz
CVSS 4.0
- Type
- Secondary
- Base score
- 5.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- MEDIUM
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
- Hype score
- Not currently trending
CVE-2025-1820 A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/cโฆ https://t.co/PfT3gVCZDa
@CVEnew
3 Mar 2025
142 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๐จ CVE-2025-1820 ๐ MEDIUM (5.3) ๐ข zj1983 - zz ๐๏ธ 2024-8 ๐ https://t.co/vGHohFT3Qq ๐ https://t.co/Wra46hJC3V ๐ https://t.co/mzIjeVreRt ๐ https://t.co/bpgwkwe9Fk #CyberCron #VulnAlert #InfoSec https://t.co/YWT70y2kJs
@cybercronai
2 Mar 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-1820 | zj1983 zz up to 2024-8 https://t.co/bRBKRBEBMf getOaWid tableId sql injection) has been published on https://t.co/GUBMlr2mYV
@WolfgangSesin
1 Mar 2025
11 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9720C3E-F370-4099-8A5D-ED5E6B0DE24E",
"versionEndIncluding": "2024-8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]