First published: Mon Apr 07 2025(Updated: )
A vulnerability has been found in joey-zhou xiaozhi-esp32-server-java up to a14fe8115842ee42ab5c7a51706b8a85db5200b7 and classified as critical. This vulnerability affects the function update of the file /api/user/update. The manipulation of the argument state leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
xiao zhi esp32 server | <=a14fe8115842ee42ab5c7a51706b8a85db5200b7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3382 is classified as a critical vulnerability.
CVE-2025-3382 allows for SQL injection through manipulation of the argument state in the /api/user/update function.
CVE-2025-3382 affects joey-zhou xiaozhi-esp32-server-java up to and including version a14fe8115842ee42ab5c7a51706b8a85db5200b7.
To mitigate CVE-2025-3382, you should update the joey-zhou xiaozhi-esp32-server-java software to a version that is not vulnerable.
CVE-2025-3382 is associated with SQL injection attacks.