- Description
- SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the database. This vulnerability was found in each of the following parameters according to the vulnerability identifier ‘User’ and “email” parameters of the ‘updatePassword’ endpoint.
- Source
- cve-coordination@incibe.es
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 9.3
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- cve-coordination@incibe.es
- CWE-89
- Hype score
- Not currently trending
🚨 CVE-2025-40624 ⚠️🔴 CRITICAL (9.3) 🏢 TCMAN - GIM 🏗️ v11 🔗 https://t.co/3SM6RGopSo #CyberCron #VulnAlert #InfoSec https://t.co/5g31bdBX8s
@cybercronai
6 May 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-40624: CRITICAL] A critical SQL injection vulnerability found in TCMAN's GIM v11 allows attackers to manipulate the database via 'updatePassword' endpoint's 'User' and 'email' parameters. #cybersec...#cve,CVE-2025-40624,#cybersecurity https://t.co/uUYgW2qACz https://t.c
@CveFindCom
6 May 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-40624 SQL injection in TCMAN's GIM v11. This vulnerability allows an unauthenticated attacker to inject an SQL statement to obtain, update and delete all information in the… https://t.co/rg437MKz4G
@CVEnew
6 May 2025
304 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tcman:gim:11.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D6B3BFF6-FD8C-4E8F-8D81-96D988E03C9F"
}
],
"operator": "OR"
}
]
}
]