-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability report explicitly identifies the edit method in Database.php as the location where unsanitized 'id' parameter input is concatenated into SQL queries. The GitHub issue #3 provides technical details showing SQL injection via this endpoint, and the CVE description confirms the attack vector through the id parameter at /databases/database/edit. The direct user input interpolation in SQL execution context matches the CWE-89 pattern.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| funadmin/funadmin | composer | <= 3.2.0 |
Ongoing coverage of React2Shell