- Description
- SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘Sender’ and “email” parameters of the ‘createNotificationAndroid’ endpoint.
- Source
- cve-coordination@incibe.es
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- cve-coordination@incibe.es
- CWE-89
- Hype score
- Not currently trending
🚨 CVE-2025-40623 ⚠️🔴 CRITICAL (9.3) 🏢 TCMAN - GIM 🏗️ v11 🔗 https://t.co/3SM6RGopSo #CyberCron #VulnAlert #InfoSec https://t.co/RHkBZ8eekv
@cybercronai
6 May 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-40623: CRITICAL] Critical SQL injection vulnerability in TCMAN's GIM v11 enables unauthorized access to database info via 'Sender' and 'email' params in 'createNotificationAndroid' endpoint.#cve,CVE-2025-40623,#cybersecurity https://t.co/zvonScYZFk https://t.co/rYScvKK8
@CveFindCom
6 May 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-40623 SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the… https://t.co/zub3WheJGY
@CVEnew
6 May 2025
329 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tcman:gim:11.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D6B3BFF6-FD8C-4E8F-8D81-96D988E03C9F"
}
],
"operator": "OR"
}
]
}
]