{"id":"CVE-2024-25428","details":"SQL Injection vulnerability in MRCMS v3.1.2 allows attackers to run arbitrary system commands via the status parameter.","modified":"2026-03-14T12:27:47.444470Z","published":"2024-02-20T22:15:08.727Z","references":[{"type":"REPORT","url":"https://github.com/wuweiit/mushroom/issues/19"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wuweiit/mushroom","events":[{"introduced":"0"},{"last_affected":"e287c4915e0b542f0920cf76437afe2354cd0249"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.1.2"}]}}],"versions":["v2.0","v3.1.1","v3.1.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25428.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}