CVE-2025-9749

7.3 HIGH
Published: August 31, 2025 Modified: April 29, 2026
View on NVD

Description

A vulnerability was identified in HKritesh009 Grocery List Management Web App up to f491b681eb70d465f445c9a721415c965190f83b. This affects an unknown part of the file /src/update.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819
Source: cna@vuldb.com
Exploit Third Party Advisory
https://vuldb.com/?ctiid.322050
Source: cna@vuldb.com
Permissions Required VDB Entry
https://vuldb.com/?id.322050
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/?submit.640488
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory
https://gist.github.com/0xSebin/a163239e0132d7d58ef1300f321da819#steps-to-reproduce
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory

7 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.3 / 10.0
EPSS (Exploit Probability)
0.0%
12th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

hkritesh009