{"id":"CVE-2018-25071","details":"A vulnerability was found in roxlukas LMeve up to 0.1.58. It has been rated as critical. Affected by this issue is the function insert_log of the file wwwroot/ccpwgl/proxy.php. The manipulation of the argument fetch leads to sql injection. Upgrading to version 0.1.59-beta is able to address this issue. The patch is identified as c25ff7fe83a2cda1fcb365b182365adc3ffae332. It is recommended to upgrade the affected component. VDB-217610 is the identifier assigned to this vulnerability.","modified":"2026-03-14T09:29:25.477854Z","published":"2023-01-07T12:15:08.900Z","references":[{"type":"ADVISORY","url":"https://github.com/roxlukas/lmeve/releases/tag/0.1.59-beta"},{"type":"ADVISORY","url":"https://vuldb.com/?ctiid.217610"},{"type":"REPORT","url":"https://vuldb.com/?id.217610"},{"type":"FIX","url":"https://github.com/roxlukas/lmeve/commit/c25ff7fe83a2cda1fcb365b182365adc3ffae332"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roxlukas/lmeve","events":[{"introduced":"0"},{"fixed":"c25ff7fe83a2cda1fcb365b182365adc3ffae332"}]},{"type":"GIT","repo":"https://github.com/roxlukas/lmeve","events":[{"introduced":"0"},{"fixed":"8389863742cdd5fb9f0a088e1010d14e60c0b143"}]},{"type":"GIT","repo":"https://github.com/roxlukas/lmeve","events":[{"introduced":"0"},{"fixed":"c25ff7fe83a2cda1fcb365b182365adc3ffae332"}]},{"type":"GIT","repo":"https://github.com/roxlukas/lmeve","events":[{"introduced":"0"},{"fixed":"8389863742cdd5fb9f0a088e1010d14e60c0b143"}]}],"versions":["0.1.45-beta","0.1.46-beta","0.1.47-beta","0.1.49-beta","0.1.50-beta","0.1.50-beta-1","0.1.51-beta","0.1.52-beta","0.1.53-beta","0.1.54-beta","0.1.55-beta","0.1.56-beta","0.1.57-beta"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-25071.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"0.1.58"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}