Vulnerability Description
A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /reset.php. The manipulation of the argument useremail leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Code-Projects | Blood Bank Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/p1026/CVE/issues/24ExploitThird Party Advisory
- https://vuldb.com/?ctiid.303504Permissions RequiredVDB Entry
- https://vuldb.com/?id.303504Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.550192Third Party AdvisoryVDB Entry
- https://github.com/p1026/CVE/issues/24ExploitThird Party Advisory
FAQ
What is CVE-2025-3307?
CVE-2025-3307 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in code-projects Blood Bank Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /reset.php. The manipulation of the argumen...
How severe is CVE-2025-3307?
CVE-2025-3307 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3307?
Check the references section above for vendor advisories and patch information. Affected products include: Code-Projects Blood Bank Management System.