First published: Fri Apr 18 2025(Updated: )
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
NamelessMC | <2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32389 has a high severity level due to its potential for SQL injection attacks.
To address CVE-2025-32389, upgrade to NamelessMC version 2.1.4 or later.
CVE-2025-32389 affects any versions of NamelessMC prior to 2.1.4.
CVE-2025-32389 is classified as an SQL injection vulnerability.
Yes, CVE-2025-32389 can be exploited by attackers through specially crafted GET parameters.