A vulnerability classified as critical was found in Pixelimity 1.0. Affected by this vulnerability is an unknown functionality of the file /install/index.php of the component Installation. The manipulation of the argument site_description leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
History

Thu, 05 Jun 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Pixelimity
Pixelimity pixelimity
CPEs cpe:2.3:a:pixelimity:pixelimity:1.0:*:*:*:*:*:*:*
Vendors & Products Pixelimity
Pixelimity pixelimity

Tue, 27 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability classified as critical was found in Pixelimity 1.0. Affected by this vulnerability is an unknown functionality of the file /install/index.php of the component Installation. The manipulation of the argument site_description leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title Pixelimity Installation index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-05-26T21:31:04.541Z

Updated: 2025-05-27T14:01:37.871Z

Reserved: 2025-05-26T13:12:12.166Z

Link: CVE-2025-5206

cve-icon Vulnrichment

Updated: 2025-05-27T14:01:34.366Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-26T22:15:19.480

Modified: 2025-06-05T14:14:49.180

Link: CVE-2025-5206

cve-icon Redhat

No data.