{"uuid": "a6e6d72f-f5f9-4100-92d3-2229ee8049f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0942", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10800", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0942\n\ud83d\udd25 CVSS Score: 6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L)\n\ud83d\udd39 Description: The DB chooser functionality in\u00a0Jalios JPlatform 10 SP6 before 10.0.6 improperly neutralizes special elements used in an SQL command allows for authenticated administrative users to trigger SQL Injection.\n\nThis issue affects JPlatform before 10.0.6 and a  PatchPlugin release 10.0.6 was issued 2023-02-06.\n\ud83d\udccf Published: 2025-04-07T21:35:31.322Z\n\ud83d\udccf Modified: 2025-04-07T21:35:31.322Z\n\ud83d\udd17 References:\n1. https://community.jalios.com/jcms/jc2_734797/fr/avertissement-de-securite-2023-02-06\n2. https://community.jalios.com/patchplugin-10.0.6", "creation_timestamp": "2025-04-07T21:45:58.000000Z"}