CVE-2025-14011

Source
https://cve.org/CVERecord?id=CVE-2025-14011
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14011.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-14011
Published
2025-12-04T18:15:50.330Z
Modified
2026-03-13T11:36:13.397373Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in JIZHICMS up to 2.5.5. Impacted is the function commentlist of the file /index.php/admins/Comment/addcomment.html of the component Add Display Name Field. Performing a manipulation of the argument aid/tid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/cherry-toto/jizhicms

Affected ranges

Type
GIT
Repo
https://github.com/cherry-toto/jizhicms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.5.5"
        }
    ]
}

Affected versions

2.*
2.3.3
2.3.4
2.3.5
2.3.7
2.3.8
2.4
2.4.0
2.4.3
2.4.7
2.4.8
2.4.9
2.5.0
2.5.1
2.5.2
2.5.3
2.5.4
Other
v1
v1.*
v1.4
v1.5
v1.5.1
v1.5.2
v1.6
v1.6.1
v1.6.2
v1.6.3
v1.6.4
v1.6.5
v1.6.6
v1.6.7
v1.7
v1.7.1
v1.8
v1.8.1
v1.9
v1.9.1
v1.9.2
v1.9.3
v1.9.4
v1.9.5
v1.9.x
v2.*
v2.4.5
v2.5.3
v2.5.4
v2.5.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14011.json"