Vulnerability Description
A vulnerability was found in SourceCodester Simple Company Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/clients/manage.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oretnom23 | Simple Company Website | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/ez-lbz/poc/issues/24ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.314340Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.314340Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.603638Third Party AdvisoryVDB Entry
- https://www.sourcecodester.com/Product
- https://github.com/ez-lbz/poc/issues/24ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-6868?
CVE-2025-6868 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability was found in SourceCodester Simple Company Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/clients/manage.php. The manipulation of t...
How severe is CVE-2025-6868?
CVE-2025-6868 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-6868?
Check the references section above for vendor advisories and patch information. Affected products include: Oretnom23 Simple Company Website.