First published: Fri Jan 17 2025(Updated: )
A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/leaveroom.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Simple Chat System | ||
Fabianros Chat System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0531 is classified as a critical vulnerability.
CVE-2025-0531 allows for SQL injection through manipulation of the 'id' argument in the /user/leaveroom.php file.
Yes, CVE-2025-0531 can be exploited remotely.
CVE-2025-0531 affects code-projects Chat System version 1.0.
To fix CVE-2025-0531, validate and sanitize user inputs in the /user/leaveroom.php file to prevent SQL injection.